A CAE Scheme Using ECC Based Self Certified PKC

نویسندگان

  • Manoj Kumar Chande
  • Cheng-Chi Lee
  • Chun-Ta Li
چکیده

School of Studies in Mathematics, Pt. Ravishankar Shukla University Raipur, 492010, Chhattisgarh, India Shri Shankaracharya Institute of Professional Management and Technology Raipur, 492015, Chhattisgarh, India Department of Library and Information Science, Fu Jen Catholic University No. 510, Jhongjheng Road, New Taipei City 24205, Taiwan, R.O.C., Taiwan Department of Photonics and Communication Engineering, Asia University No. 500, Lioufeng Road, Taichung City 41354, Taiwan, R.O.C., Taiwan Department of Information Management, Tainan University of Technology No. 529, Zhongzheng Road, Tainan City 71002, Taiwan, R.O.C., Taiwan

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems

This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self-certified public key systems. Combining the merits of self-certified public key cryptosystems, the proposed scheme has the property that authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing comput...

متن کامل

CLB-ECC: Certificateless Blind Signature Using ECC

Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for ...

متن کامل

A Secure Electronic Payment System Based on Efficient Public Key Infrastructure

At present, electronic payment activities constructed on the Internet mainly employ the certificate-based public key cryptosystems to solve related security issues. But it is based on the condition that the certificate authority (CA) must be honest and needs to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA...

متن کامل

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

An efficient RFID mutual authentication scheme based on ECC

Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCS

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2016