Introduction to identity-based cryptography

被引:4
|
作者
Joux, Antoine [1 ]
机构
[1] DGA and University, Versailles St-Quentin-en-Yvelines, France
关键词
Active field - Cryptographic community - Identity based cryptography - Identity-based;
D O I
10.3233/978-1-58603-947-9-1
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 12
相关论文
共 50 条
  • [41] Cross-platform Identity-based Cryptography using WebAssembly
    Vecsi, Adam
    Bagossy, Attila
    Petho, Attila
    INFOCOMMUNICATIONS JOURNAL, 2019, 11 (04): : 31 - 38
  • [42] Improved TLS Handshake Protocols Using Identity-based Cryptography
    Peng, Changyan
    Zhang, Quan
    Tang, Chaojing
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 135 - 139
  • [43] An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    Vincent O.R.
    Okediran T.M.
    Abayomi-Alli A.A.
    Adeniran O.J.
    SN Computer Science, 2020, 1 (2)
  • [44] Key refreshing in identity-based cryptography and its applications in MANETs
    Balfe, Shane
    Boklan, Kent D.
    Klagsbrun, Zev
    Paterson, Kenneth G.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2924 - +
  • [45] Applicability of Identity-Based Cryptography for Disruption-Tolerant Networking
    Asokan, N.
    Kostiainen, Kari
    Ginzboorg, Philip
    Ott, Joerg
    Luo, Cheng
    MOBIOPP'07 - PROCEEDINGS OF THE FIRST INTERNATIONAL MOBISYS WORKSHOP ON MOBILE OPPORTUNISTIC NETWORKING, 2007, : 52 - 56
  • [46] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
  • [47] Secure Mobility Management for MIPv6 with Identity-Based Cryptography
    Guo, Nan
    Peng, Fangting
    Gao, Tianhan
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 173 - 178
  • [48] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [49] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [50] Combining Mediated and Identity-Based Cryptography for Securing E-Mail
    Al-Janabi, Sufyan T. Faraj
    Abd-alrazzaq, Hussein Khalid
    DIGITAL ENTERPRISE AND INFORMATION SYSTEMS, 2011, 194 : 1 - 15