Identity Management Online and Offline among Multi-religious Communities
نویسندگان
چکیده
منابع مشابه
Identity-Based Online/Offline Encryption
We consider a scenario of identity-based encryption (IBE) where the encryption device (such as a smartcard) has low power. To improve the computation efficiency, it is desirable that part of computation can be done prior to knowing the message and the recipient (its identity or public key). The real encryption can be conducted efficiently once the message and the recipient’s identity become ava...
متن کاملIdentity Based Online/Offline Signcryption Scheme
Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require any heavy computations like pairing, multiplication on elliptic curves and is very efficient. To the best of o...
متن کاملOnline/Offline Identity-Based Signcryption Revisited
In this paper, we redefine a cryptographic notion called Online/Offline Identity-Based Signcryption. It is an “online/offline” version of identity-based signcryption, where most of the computations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices ...
متن کاملImproved Identity-Based Online/Offline Encryption
The notion of online/offline encryption was put forth by Guo, Mu and Chen (FC 2008), where they proposed an identity-based scheme called identity-based online/offline encryption (IBOOE). An online/ offline encryption separates an encryption into two stages: offline and online. The offline phase carries much more computational load than the online phase, where the offline phase does not require ...
متن کاملIdentity Based Online/Offline Encryption Scheme
Consider the situation where a low power device with limited computational power has to perform cryptographic operation in order to do secure communication to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operations into resource consuming, heavy operations (which are performed when the device is idle) and the fast l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mediator: Jurnal Komunikasi
سال: 2020
ISSN: 2581-0758,1411-5883
DOI: 10.29313/mediator.v13i1.5293