Identity-based cryptography

Results: 85



#Item
31Computer security / Email authentication / Internet privacy / Email / Email encryption / Encryption software / Password / Encrypting File System / Email client / Computing / Cryptography / Cryptographic software

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:09
32Computer security / Email authentication / Internet privacy / Email / Email encryption / Encryption software / Password / Encrypting File System / Email client / Computing / Cryptography / Cryptographic software

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:09
33Cryptography / Access control / Videotelephony / Advanced Encryption Standard / EMC Corporation / SecurID / Smart card / Radio-frequency identification / Authentication / Security / Technology / Ubiquitous computing

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2011-09-08 18:03:53
34Cloud standards / Cross-platform software / Key management / Public-key cryptography / OpenID / Gmail / Information Card / Google Chrome / Internet privacy / Software / Computing / Federated identity

Federated Browser-Based Identity using Email Addresses Mike Hanson Dan Mills Ben Adida

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2011-05-12 17:26:02
35Ciphertext / RSA / ElGamal encryption / Boneh/Franklin scheme / Public-key cryptography / Adaptive chosen-ciphertext attack / Chosen-plaintext attack / Cipher / Chosen-ciphertext attack / Cryptography / Proxy re-encryption / ID-based encryption

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
36Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
37Key distribution / Wireless sensor network / ID-based encryption / Public-key cryptography / Key-agreement protocol / Pairing-based cryptography / Sensor node / Key / Elliptic curve cryptography / Cryptography / Key management / Cryptographic protocols

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
38Mathematics / Electronic commerce / ID-based encryption / RSA / Multilinear map / Ribe / Bilinear map / ID-based cryptography / Cryptography / Public-key cryptography / Multilinear algebra

New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park∗ Kwangsu Lee†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 20:30:36
39RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
40Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
UPDATE