[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kalyani et al., 2016 - Google Patents

Survey on identity based and hierarchical identity based encryption schemes

Kalyani et al., 2016

View PDF
Document ID
2221840039065474654
Author
Kalyani D
Sridevi R
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Baek et al. Identity-based threshold decryption
USRE48644E1 (en) Cryptographic system using pairing with errors
Wu et al. A new efficient certificateless signcryption scheme
Guo et al. Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key
Li et al. Indentity-based broadcast signcryption
Gorantla et al. A survey on id-based cryptographic primitives
Kalyani et al. Survey on identity based and hierarchical identity based encryption schemes
Mu et al. Identity-based authenticated broadcast encryption and distributed authenticated encryption
Kumar et al. Survey and taxonomy of key management protocols for wired and wireless networks
Lu et al. Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
Chen An interpretation of identity-based cryptography
Zhang et al. New application of partitioning methodology: identity‐based dual receiver encryption
Elkamchouchi et al. A new proxy identity-based signcryption scheme for partial delegation of signing rights
Kalyani et al. New Hierarchical Identity Based Encryption with maximum hierarchy.
Yang et al. Efficient mediated certificates public-key encryption scheme without pairings
Libert et al. What is possible with identity based cryptography for PKIs and what still must be improved
Saxena Threshold ski protocol for id-based cryptosystems
Swapna et al. Efficient identity based multi-signcryption scheme with public verifiability
Kumar et al. Secure and efficient threshold key issuing protocol for ID-based cryptosystems
Catalano et al. Fully non-interactive onion routing with forward-secrecy
Yang et al. An identity-based encryption scheme for broadcasting
Wang et al. Identity based threshold proxy signcryption scheme
Tripathi et al. Foretaste on identity based encryption
Choi Adoptation of Weil pairing IBE for secure file sharing
Ahmad et al. TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet