Price, "A comparison between traditional public key infrastructures and identity-based cryptography", Information Security Technical Report, 8(3) (2003), 57-72.Paterson, K.G., Price, G. (2003). A comparison bet
public-key infrastructureThis work aims to exploit a distinguished method of the public key cryptography which is known as Identity-Based Cryptography (IBC) to solve the usability problem of secure e-mail systems. The public key is taken from general information (such as e-mail address) of the...
CryptographySecurityMobileCallsGSMUMTSIdentiy-BasedSmartphonesIn this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security over...
Public key cryptographySMSSecure data communicationMobile telecommunicationElliptic curve cryptographyTo exploit the popularity of SMS as a secure business bearer protocol and offer the security services such as confidentiality, integrity, authentication and non-repudiation. In this study, we propose a ...
Encyclopedia of Cryptography, Security and Privacy Zhen Zhao & Fuchun Guo 617 Accesses Synonyms Identity-Based Cryptosystems; Public key encryption Definitions Identity-based encryption (IBE) is a special kind of public key encryption (PKE) in which users can benefit from public key encryption ...
He has published about 60 papers in the field of cryptography and information security. Xiaoshuang Luo now is a master student in the Engineering University of Chinese Armed Police Force. His main research interests include public key cryptography and cloud security....
aThis limits the utility of identity-based cryptography as a transitional step to full-blown public key cryptography. Furthermore, it is fundamentally difficult to reconcile finegrained revocation with identity-based cryptography. 这限制基于身分的密码学的公共事业作为过渡步到盛放的公共密钥加密法。
Although many studies on efficient revocation mechanisms have been proposed in public key cryptography, there are only a few studies on identity-based cryptography that consider the user’s identity as his/her public key. Boneh and Franklin [1] first proposed an approach to revoke users in an ...
scheme (see alsoidentity-based cryptography) is apublic keyencryption scheme in which the public key can be an arbitrary string. For example, if Alice wants to send a message to Bob at bob@yahoo.com, she simply encrypts the message using the string “bob@yahoo.com” as the public key....
Li et al. [9] proposed a DA protocol using certificate authority-based public key cryptography (CA-PKC) that utilizes a public key infrastructure (PKI) to issue, store, deliver, and revoke the public key certificates of the users. The protocol was originally proposed to implement a secure ...