Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








35,965 Hits in 3.7 sec

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han
2011 Mathematical and computer modelling  
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.  ...  But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group.  ...  Hence, the problem of certificate management arises. To solve the problem, Shamir [1] defined a new public key cryptography called identity-based public key cryptography.  ... 
doi:10.1016/j.mcm.2011.08.004 fatcat:2nxbonggorg4pf72auvjdjdog4

Bi-serial DNA Encryption Algorithm(BDEA) [article]

D.Prabhu Dept of Information Technology, Mailam Engineering College, Mailam (Affiliated to Anna University of Technology, Chennai) Lecturer, Dept of Information Technology, Christ College of Engineering and Technology, (Affiliated to Pondicherry University, Puducherry))
2011 arXiv   pre-print
DNA cryptography is a emerging field of cryptography.  ...  Data treatment is used to transform the plain text into cipher text which provides excellent security  ...  The security requirements should based depend only on the secrecy of decryption key. In encryption scheme as a key kA, kB and pair of PCR primer pairs.  ... 
arXiv:1101.2577v1 fatcat:hxtc3uhl3jcffizclow4cs2xnm

Security Frameworks for Wireless Sensor Networks-Review

Gaurav Sharma, Suman Bala, Anil K. Verma
2012 Procedia Technology - Elsevier  
Since WSN suffer from many constraints including lower processing power, low battery life, small memory and wireless communication channel, security becomes the main concern to deal with such kind of networks  ...  This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.  ...  . 3.2.3 Pairing Based cryptographic frameworks In this subsection of asymmetric cryptographic frameworks, we discuss a cryptographic framework which uses pairing based cryptography for the security measures  ... 
doi:10.1016/j.protcy.2012.10.119 fatcat:6vmzafrfabhlfa47iy35uhq4zm

7-5 Structure Preserving Cryptography

Miyako Ohkubo
2017 Journal of NICT  
For example, we propose an SP digital signature scheme whose security is based on the hardness of merging two pairs of random source group elements, (X1, Y1) and (X2, Y2), into one pair, (X3, Y3), whose  ...  ., an anonymous credential system [14] ), structure-preserving cryptography contributes to advancing other areas of research that include symbolic security analysis and computer aided system design [  ... 
doi:10.24812/nictjournal.63.2_223 fatcat:43bx5ar5evcndos6l3qz6p3jzy

A Genetic Improved Quantum Cryptography Model to Optimize Network Communication

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Later on genetic model is applied to identify the most effective communication pair. Finally, the quantum key based SHA is applied to perform the data encoded.  ...  In this work, a quantum inspired encoded communication is provided to improve the communication reliability and security.  ...  In this section, the requirement of security for a network is defined. The cryptography model and the characterization of quantum cryptography is provided in this paper.  ... 
doi:10.35940/ijitee.i1040.0789s19 fatcat:6htww5s2gvbmfoxun7kdxrmyme

A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography

K.Lakshmi Ragini, V.Rani Mounika, K. Sandeep
2017 International Journal of Advanced engineering Management and Science  
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC).  ...  As the technology is increasing more number of clients would like to store their data in the public cloud.  ...  Once the linear pairings are brought into the identity-based cryptography, identity-based cryptography becomes economical and sensible.  ... 
doi:10.24001/ijaems.3.4.9 fatcat:xz2zox4fc5bi3fvynbmrw7lggy

Visual Cryptography Using Neighborhood Based Encryption Techniques in The Framework of Cellular Automata

2022 Journal of Mathematical Techniques and Computational Mathematics  
Through this visual cryptography technique, the users hide information securely based on key authentication.  ...  This paper discusses another approach to visual cryptography using neighborhood-based encryption techniques in the framework of cellular automata. A cellular automaton has a grid of cells.  ...  ., explain in their paper titled 'Optimal XOR based (2, n)-visual cryptography schemes state key laboratory of information security' experimental results of a visual cryptography scheme for (2, n).  ... 
doi:10.33140/jmtcm.01.02.08 fatcat:xclnqqn7nbeknbx266pnlyshrm

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

Reza Alimoradi, Seiied-Mohammad-Javad Razavian, Ali Ramzi
2017 ICTACT Journal on Communication Technology  
Identity based cryptography is one important type of public key cryptography which using some bilinear functions called pairing functions was seriously applied.  ...  But, today by introduction of new needs in these networks and their security development, researchers of security and cryptography try to find new ways to increase efficiency and security of wireless sensor  ...  List of abbreviations Wireless Sensor Networks WSN Elliptic Curve Cryptography ECC Identity Based Cryptography IBC Pairing Based Cryptography PBC Public Key Infrastructure PKI Base Station BS  ... 
doi:10.21917/ijct.2017.0237 fatcat:aj7elrc7crd67liql4vfmq37ra

Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid Computing

Amr Farouk, Mohamed M. Fouad, Ahmed A. Abdelhafez
2014 International Journal of Security Privacy and Trust Management  
We also show, a GPC-AKA security protocol proof using formal automated security analysis Sycther tool.  ...  Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing.  ...  Therefore, the certificate-free authentication has emerged based on identity-based cryptography (IBC) using pairings.  ... 
doi:10.5121/ijsptm.2014.3103 fatcat:u6hcftm7fbeprai6gmqn3dik7a

A Hybrid Cryptography and Authentication based Security Model for Clustered WBAN

Aarti Sangwan, Partha Pratim Bhattacharya
2018 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
A hybrid authentication and cryptography based method is defined for identity and information level security.  ...  This kind of multi-level involvement of nodes opens the nodes for security leaks. In this paper, a dual level security is integrated using hybrid cryptography method.  ...  Figure 6 : 6 Figure 6: Scalability based Dead Node Analysis Figure Figure 7: Scalability based Packet Communication Analysis Figure 8 : 8 Figure 8: Scalability based Network Energy Analysis Table  ... 
doi:10.26782/jmcms.2018.04.00003 fatcat:ivq5k5uo2ne47oje35jjikyahu

Cryptography On Android Message Application Using Look Up Table And Dynamic Key (Cama)

Manisha Madhwani
2012 IOSR Journal of Computer Engineering  
In this paper we propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric encryption and decryption is used in this algorithm.  ...  Most popular shortest and cheapest textual form of communication is short message service (SMS).To ensure the security of the texts which is sent, many algorithm are available.  ...  (ii) Cryptography: Cryptography is the practice and study of techniques for secure communication in the presence of third parties [13] .  ... 
doi:10.9790/0661-0625459 fatcat:jjwzeyepgbcbzeccwuf4rfcqfe

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks

Yong YU, Jianbing NI, Ying SUN
2013 IEICE transactions on information and systems  
They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol.  ...  sensor nodes without involving the base station.  ...  The readers can refer to [11] for the latest results of implementation of pairing-based cryptography on a sensor node.  ... 
doi:10.1587/transinf.e96.d.1875 fatcat:6lwmm6johvhznnzf5gwlyyzjs4

Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits [article]

Saiful Islam Salim, Adnan Quaium, Sriram Chellappan, A. B. M. Alim Al Islam
2020 arXiv   pre-print
of the qubit pairs.  ...  Focusing on this issue, we propose a method to enhance the fidelity of quantum cryptography using maximally entangled qubit pairs.  ...  Findings and conclusions are those of the authors alone, and do not reflect views of NSF.  ... 
arXiv:2009.04155v1 fatcat:ob3cegitfvfqlbto3gih2iktby

7-1 Recent Developments in Security Evaluation Technologies of Cryptosystems

Naoyuki Shinohara, Yoshinori Aono, Takuya Hayashi
2017 Journal of NICT  
This paper describes the security evaluation of pairing-based and lattice-based cryptography.  ...  Security estimation of lattice-based cryptography The security of lattice-based cryptography is based on some types of lattice point search problems of lattice vectors.  ... 
doi:10.24812/nictjournal.63.2_189 fatcat:cbcgouvgmzfhrljazilqgjhkzu

The Special Number Field Sieve in $\mathbb{F}_{p^{n}}$ [chapter]

Antoine Joux, Cécile Pierrot
2014 Lecture Notes in Computer Science  
We start with a precise analysis of the state-of-the-art algorithms for computing discrete logarithms that are suitable for finite fields related to pairing-friendly constructions.  ...  In this paper, we study the discrete logarithm problem in finite fields related to pairing-based curves.  ...  First, we show that for current parameters of high-security pairing-based cryptography, the implicit assumption is incorrect and that the state-of-the-art algorithm for discrete logarithms in this case  ... 
doi:10.1007/978-3-319-04873-4_3 fatcat:j47uqbhv3zayfjfw7xitb34sgi
« Previous Showing results 1 — 15 out of 35,965 results