Survey of security on identity-based cryptography

被引:0
|
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2009年 / 9卷 / 1537-1548期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
    Srivastava, Gaurav
    Agrawal, Richa
    Singh, Kunwar
    Tripathi, Rajeev
    Naik, Kshirasagar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 348 - 367
  • [22] Research on Application of Blockchain and Identity-Based Cryptography
    Zhu, Xingxiong
    Fan, Tao
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [23] A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
    Gaurav Srivastava
    Richa Agrawal
    Kunwar Singh
    Rajeev Tripathi
    Kshirasagar Naik
    Peer-to-Peer Networking and Applications, 2020, 13 : 348 - 367
  • [24] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
  • [25] Simple identity-based cryptography with mediated RSA
    Ding, XH
    Tsudik, G
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 193 - 210
  • [26] Identity-Based Threshold Cryptography for Electronic Voting
    Gallegos-Garcia, Gina
    Gomez-Cardenas, Roberto
    Duchen-Sanchez, Gonzalo I.
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '09), 2009, : 135 - +
  • [27] Private Communication Based on Hierarchical Identity-Based Cryptography
    Kalyani, D.
    Sridevi, R.
    EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 749 - 756
  • [28] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [29] An Identity-based Cryptography Scheme Based on FullIdent Algorithm
    Xie Yumin
    Kamran, Muhammad
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2691 - 2696
  • [30] ARIBC: Online Reporting Based on Identity-Based Cryptography
    Goudosis, Athanasios
    Katsikas, Sokratis
    FUTURE INTERNET, 2021, 13 (02): : 1 - 17