ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

被引:0
|
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China [1 ]
不详 [2 ]
机构
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 75-80,120期
关键词
D O I
10.1016/S1005-8885(08)60407-0
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [22] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732
  • [23] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 86 - 89
  • [24] Improvement of identity-based encryption scheme and algorithms
    Zheng, Ying
    Bai, Qing-Hai
    Zhao, Lin-Na
    Zhang, Hong-Mei
    Zhang, Yu-Chun
    DESIGN, MANUFACTURING AND MECHATRONICS (ICDMM 2015), 2016, : 482 - 489
  • [25] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [26] Identity-based encryption scheme with compact ciphertexts
    Liu S.-L.
    Guo B.-A.
    Zhang Q.-S.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 86 - 89
  • [27] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [28] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [29] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [30] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95