• No results found

group public key

A New Group Signature Scheme using IBE

A New Group Signature Scheme using IBE

... A group members can do sign on behalf of the group using the Group ...the group manager nor a group member can sign messages on behalf of other group ...the group manager ...

7

Efficient  Group  Signature  Scheme  without  Pairings

Efficient Group Signature Scheme without Pairings

... In public key cryptography, the management of public keys is a critical ...that public key belongs to the corresponding user. Then, in a group signature scheme based on ...

36

Securing tuple space: secure ad hoc group communication using PKI

Securing tuple space: secure ad hoc group communication using PKI

... a group symmetric key is done using the ...current group symmetric key and the user may initialize an instance of FixedHelixSecurityContext using the read ...the group public ...

68

Proficient and Reliable Anonymous Routing Protocol (RARP) in Mobile Ad Hoc Network Environment using Digital Signatures

Proficient and Reliable Anonymous Routing Protocol (RARP) in Mobile Ad Hoc Network Environment using Digital Signatures

... In group signature, each group member can sign documents on behalf of the whole ...a group member [4]. However, no one except the group manager can recover the exact identity of the ...and ...

6

Multi Decryption Key Agreement in Dynamic Peer Group

Multi Decryption Key Agreement in Dynamic Peer Group

... In AIKG.2 more so than in AIKG.1, the highest-indexed group member M n plays a special role by having to broadcast the last round of intermediate values. The main advantage of AIKG.2 is due to its low number of ...

6

Security in Cloud Computing Using Cryptographic Algorithms

Security in Cloud Computing Using Cryptographic Algorithms

... symmetric key encryption. Symmetric-key algorithms are those algorithms which use the same key for both encryption and ...the key is kept ...algorithm, key of fixed size is applied on ...

9

Accountable  Tracing  Signatures

Accountable Tracing Signatures

... a public-key encryption scheme key-oblivious if (i) it allows for a large set of public keys all related to the same secret key, if (ii) existing public keys can be randomized to ...

19

Prototype for Keyword Search Mechanism Using Identity-Based Encryption

Prototype for Keyword Search Mechanism Using Identity-Based Encryption

... the public-key is used and for the decryption purpose private-key is ...In public-key encryption, a person can use the receiver’s public-key to encrypt the data and upload ...

5

Electronic Document Secure Management System Based on Content Analysis for Enterprise

Electronic Document Secure Management System Based on Content Analysis for Enterprise

... and Public key infrastructure (PKI) ...the public key based encryption, digital signature, and the key and certificate automatic management to guarantee confidentiality, authenticity, ...

7

Group  key  exchange  protocols  withstanding  ephemeral-key  reveals

Group key exchange protocols withstanding ephemeral-key reveals

... a group key exchange protocol is executed, the session key is typically extracted from two types of secrets; long-term keys (for authentication) and freshly generated (often random) ...the ...

17

A New Approach Using Secure Public Key Techniques Without Group Manager For Spontaneous Wireless Networks

A New Approach Using Secure Public Key Techniques Without Group Manager For Spontaneous Wireless Networks

... memberships, group signatures, and distributed signatures are troublesome to ...networks, key exchange mechanisms for node authorization and user authentication are ...distribution key algorithms, ...

5

A  novel  Group  Key  Transfer  Protocol

A novel Group Key Transfer Protocol

... design group key distribution protocols, which was first introduced by both Blakley [1] and Shamir [29] independently in ...the key generation center (KGC), always ...the key predistribution ...

18

Repeated Random Enciphering – A Novel Method to Support Data Security on Transit over Networks

Repeated Random Enciphering – A Novel Method to Support Data Security on Transit over Networks

... The growth of network of computers has paved way for the ease of communication and the benefits of networks can be listed to a great extent. The growing need for network security and secure data transfer has to be ...

10

CN-4.ppt

CN-4.ppt

...  use of public-key encryption to use of public-key encryption to distribute distribute secret keys.. secret keys..[r] ...

30

Offline  Assisted  Group  Key  Exchange

Offline Assisted Group Key Exchange

... The users in our collaboration scenario will be content to trust their cloud storage provider (CSP) to make their data available. Some users will be content to trust their CSP to use simple access control to prevent ...

23

Scalable  Deniable  Group  Key  Establishment

Scalable Deniable Group Key Establishment

... unauthenticated group key establishment, the protocol compiler we described outputs an authenticated group key ...deniable group key establishment with three ...

17

Multipair Public Key Cryptosystem

Multipair Public Key Cryptosystem

... Present days, security is required to transmit confidential information over the network. Security is also required in a wide range of applications. Internet is frequently used to upload web pages and other documents ...

6

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

... and key management service should be compatible to the continuously changing scale of the ad hoc network, which may range from decades of nodes to hundreds of nodes, or even thousands of ...

5

Public Key Infrastructure: A Survey

Public Key Infrastructure: A Survey

... Responsibility is not taken only by the CA. CA customers should take the necessary measures to save their own data. The most important reviewing contracts and certificates from CA to ensure lack of erroneous data. ...

8

A comparison between Public key authority and certification authority for distribution of public key

A comparison between Public key authority and certification authority for distribution of public key

... the public key authority it maintains a greater degree of security in this the public authority maintains a directory with the name and public key for each and every ...its ...

5

Show all 10000 documents...

Related subjects