Sciweavers

45 search results - page 2 / 9
» Identity-Based Cryptography for Grid Security
Sort
View
IACR
2011
128views more  IACR 2011»
12 years 4 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
AINA
2009
IEEE
13 years 10 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 3 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
AINA
2007
IEEE
13 years 11 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
COCOON
2010
Springer
13 years 10 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...