A CAE Scheme Using ECC Based Self Certified PKC
نویسندگان
چکیده
School of Studies in Mathematics, Pt. Ravishankar Shukla University Raipur, 492010, Chhattisgarh, India Shri Shankaracharya Institute of Professional Management and Technology Raipur, 492015, Chhattisgarh, India Department of Library and Information Science, Fu Jen Catholic University No. 510, Jhongjheng Road, New Taipei City 24205, Taiwan, R.O.C., Taiwan Department of Photonics and Communication Engineering, Asia University No. 500, Lioufeng Road, Taichung City 41354, Taiwan, R.O.C., Taiwan Department of Information Management, Tainan University of Technology No. 529, Zhongzheng Road, Tainan City 71002, Taiwan, R.O.C., Taiwan
منابع مشابه
ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self-certified public key systems. Combining the merits of self-certified public key cryptosystems, the proposed scheme has the property that authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing comput...
متن کاملCLB-ECC: Certificateless Blind Signature Using ECC
Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for ...
متن کاملA Secure Electronic Payment System Based on Efficient Public Key Infrastructure
At present, electronic payment activities constructed on the Internet mainly employ the certificate-based public key cryptosystems to solve related security issues. But it is based on the condition that the certificate authority (CA) must be honest and needs to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA...
متن کاملConstructing Secure Mobile-Agent-Based Consumer Electronic Applications
This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...
متن کاملAn efficient RFID mutual authentication scheme based on ECC
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCS
دوره 12 شماره
صفحات -
تاریخ انتشار 2016