ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

被引:0
|
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China [1 ]
不详 [2 ]
机构
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 75-80,120期
关键词
D O I
10.1016/S1005-8885(08)60407-0
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
  • [42] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [43] An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT
    Fan, Chun-I
    Shie, Cheng-Han
    Tseng, Yi-Fan
    Huang, Hui-Chun
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [44] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [45] An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature
    Gao, Tianhan
    Qi, Jiayu
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 490 - 497
  • [46] Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
    Zhang, FG
    Susilo, W
    Mu, Y
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 45 - 56
  • [47] (Hierarchical) Identity-Based Encryption from Affine Message Authentication
    Blazy, Olivier
    Kiltz, Eike
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 408 - 425
  • [48] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [49] Identity-based searchable encryption scheme with a designated tester
    Wang, Shao-Hui
    Han, Zhi-Jie
    Xiao, Fu
    Wang, Ru-Chuan
    Wang, Shao-Hui, 1600, Editorial Board of Journal on Communications (35): : 22 - 32
  • [50] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537