Introduction to identity-based cryptography

被引:4
|
作者
Joux, Antoine [1 ]
机构
[1] DGA and University, Versailles St-Quentin-en-Yvelines, France
关键词
Active field - Cryptographic community - Identity based cryptography - Identity-based;
D O I
10.3233/978-1-58603-947-9-1
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 12
相关论文
共 50 条
  • [21] EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 179 - 185
  • [22] RFID system security using identity-based cryptography
    Liang, Yan
    Rong, Chunming
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
  • [23] Toward hierarchical identity-based cryptography for tactical networks
    Matt, BJ
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 727 - 735
  • [24] Securing Mobile Phone Calls with Identity-Based Cryptography
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
  • [25] Identity-based Cryptography for Securing Mobile Phone Calls
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
  • [26] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [27] Identity-Based Cryptography on Hidden-Order Groups
    Lin, Chanlgu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2067 - 2071
  • [28] RFID System Security Using Identity-Based Cryptography
    Chen, Youqin
    Chen, Zhide
    Xu, Li
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 460 - 464
  • [29] E-passport EAC scheme based on Identity-Based Cryptography
    Li, C. H.
    Zhang, X. F.
    Jin, H.
    Xiang, W.
    INFORMATION PROCESSING LETTERS, 2010, 111 (01) : 26 - 30
  • [30] A secret classified label control model based on the identity-based cryptography
    Wu, Zhijun
    Tian, Shan
    Li, Wen
    Yue, Meng
    Wang, Jian
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 96 - 101