Kalyani et al., 2016 - Google Patents
Survey on identity based and hierarchical identity based encryption schemesKalyani et al., 2016
View PDF- Document ID
- 2221840039065474654
- Author
- Kalyani D
- Sridevi R
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based …
- 238000000034 method 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baek et al. | Identity-based threshold decryption | |
USRE48644E1 (en) | Cryptographic system using pairing with errors | |
Wu et al. | A new efficient certificateless signcryption scheme | |
Guo et al. | Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key | |
Li et al. | Indentity-based broadcast signcryption | |
Gorantla et al. | A survey on id-based cryptographic primitives | |
Kalyani et al. | Survey on identity based and hierarchical identity based encryption schemes | |
Mu et al. | Identity-based authenticated broadcast encryption and distributed authenticated encryption | |
Kumar et al. | Survey and taxonomy of key management protocols for wired and wireless networks | |
Lu et al. | Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. | |
Chen | An interpretation of identity-based cryptography | |
Zhang et al. | New application of partitioning methodology: identity‐based dual receiver encryption | |
Elkamchouchi et al. | A new proxy identity-based signcryption scheme for partial delegation of signing rights | |
Kalyani et al. | New Hierarchical Identity Based Encryption with maximum hierarchy. | |
Yang et al. | Efficient mediated certificates public-key encryption scheme without pairings | |
Libert et al. | What is possible with identity based cryptography for PKIs and what still must be improved | |
Saxena | Threshold ski protocol for id-based cryptosystems | |
Swapna et al. | Efficient identity based multi-signcryption scheme with public verifiability | |
Kumar et al. | Secure and efficient threshold key issuing protocol for ID-based cryptosystems | |
Catalano et al. | Fully non-interactive onion routing with forward-secrecy | |
Yang et al. | An identity-based encryption scheme for broadcasting | |
Wang et al. | Identity based threshold proxy signcryption scheme | |
Tripathi et al. | Foretaste on identity based encryption | |
Choi | Adoptation of Weil pairing IBE for secure file sharing | |
Ahmad et al. | TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet |