A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Personalization Using Proxy Cryptography
[chapter]
2000
Lecture Notes in Computer Science
In this paper we describe new secure personalization schemes using proxy cryptography. ...
With this proxy cryptosystem we setup new security schemes for smart cards personalization and we show that they are more secure, flexible and cheap than existing ones. ...
In this paper, we describe new secure personalization schemes using proxy cryptography. ...
doi:10.1007/10721064_30
fatcat:bqc3rnf2wrdf7bjygtn2xdzgyu
A Survey on Remote Data Integrity Checking in PCS with ID-Based Proxy minded Record Uploading
2017
International Journal of Recent Trends in Engineering and Research
From the security issues, we recommend a singular proxyoriented data uploading and remote data integrity checking version in identity-primarily based public key cryptography: identity-primarily based proxy-oriented ...
Then, a concrete identity-PUIC protocol is designed using the bilinear pairings. Our identity-PUIC protocol is likewise green and bendy. ...
In some cases, the some operation is delegated to the third party, as an example proxy. Thus, we've got to use the proxy cryptography. Proxy cryptography may be an important cryptography primitive. ...
doi:10.23883/ijrter.2017.3103.r1y1n
fatcat:ldryknv4evd33okgj2ty2u5jaq
A distributed key assignment protocol for secure multicast based on proxy cryptography
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
multicast network that leverages proxy cryptography; and 3) We adopt a hybrid encryption technique that makes our framework more efficient and practical. ...
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. ...
Then, using key composition, we propose a distributed key assignment protocol (DKAP) that eliminates the centralized controller used in proxy cryptography-based secure multicast networks. ...
doi:10.1145/1128817.1128875
dblp:conf/ccs/HuangCCL06
fatcat:cnjfnxoncrgypfcyqku6dhgjca
Secure and efficient bi-directional proxy re-encyrption technique
2016
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. ...
To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. ...
The Proxy Re-Encryption technique generally assures security (1) that the proxy cannot re-encrypt the cipher data in a useful form before receiving the encryption key, and (2) that neither the receiver ...
doi:10.1109/iccicct.2016.7987923
fatcat:kuwqzcztjnaevari5x6cta74ee
A general design towards secure ad-hoc collaboration
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
multicast network that leverages proxy cryptography; and 3) We adopt a hybrid encryption technique that makes our framework more efficient and practical. ...
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. ...
Then, using key composition, we propose a distributed key assignment protocol (DKAP) that eliminates the centralized controller used in proxy cryptography-based secure multicast networks. ...
doi:10.1145/1128817.1128874
dblp:conf/ccs/NakaeZS06
fatcat:rbrxdc6nnjaz7kgrhdqftfncmu
Organizational Cryptography for Access Control
[article]
2018
IACR Cryptology ePrint Archive
A cryptosystem for granting/rescinding access permission is proposed, based on elliptic curve cryptography. ...
The authors appreciate Secure IoT Platform Consortium, which is working on the SCOPE project together with Chuo University, for the fruitful discussions and advices. ...
Nonetheless, currently most of the security systems using cryptography seem to have difficulty in dynamic access cotrol. ...
dblp:journals/iacr/GotaishiT18
fatcat:4napwkle2ncbfifyodoq6gf2aq
A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography
2017
International Journal of Advanced engineering Management and Science
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC). ...
This protocol is efficient and flexible, this may be provably secured by using Computational Diffie-Hellman problem. ...
In some cases, the cryptologic operation are delegated to the third party, as an example proxy. Thus, we've got to use the proxy cryptography. ...
doi:10.24001/ijaems.3.4.9
fatcat:xz2zox4fc5bi3fvynbmrw7lggy
Proxy Smart Card Systems
[chapter]
2010
Lecture Notes in Computer Science
We stress the problematic aspects concerning the use of known proxy-cryptography schemes in synergy with current standard technologies. This in turn motivates the need of proxy smart card systems. ...
Unfortunately, secure delegation systems proposed so far (e.g., proxy signatures) include various drawbacks for any practical system. ...
We notice that currently no proxy-cryptography scheme seems to be concretely used in practice. ...
doi:10.1007/978-3-642-12368-9_15
fatcat:tzrtd246yzhb7jxmgji3nk3qri
A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication
2011
International Journal of Computer Applications
In this paper we propose a threshold digital signature scheme by using RSA cryptography to authenticate multimedia content. ...
This scheme is also secure against conspiracy attack. ...
The threshold proxy signature scheme uses the RSA cryptography to generate the group private and the public key for the group members. ...
doi:10.5120/2450-2548
fatcat:xcm7eqt3t5edjhnamoj4aq7lsm
Threshold Delegation Scheme Based on Multi-Proxy Re-Encryption
2016
International Journal of Security and Its Applications
Security weakness against collusion between proxy and delegatee can be prvented by applying such a technique, and re-encryption control by multi-proxy becomes possible. ...
Proxy re-encryption (PRE) is a re-encryption technique to enable decryption of information encrypted with a delegator's public key by using the delegatee's private key. ...
ID-based Cryptography Systems An ID-based cryptography system is one that uses a receiver's ID upon encryption [1] . ...
doi:10.14257/ijsia.2016.10.7.31
fatcat:v3tsykq5zngsrhpdehddjcqova
A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2017
International Journal of Science and Research (IJSR)
From the security issues, we propose a novel proxy arranged information transferring and remote information respectability checking model in personality based open key cryptography: IDPUIC (personality ...
based proxy situated information transferring and remote information respectability checking in broad daylight cloud). ...
Personality based open key cryptography can take out the confounded testament administration. ...
doi:10.21275/art20164284
fatcat:butrof7jmzgilp24nhox5wvsni
7-4 An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications
2017
Journal of NICT
Acknowledgments We are grateful to Technical Researchers Takashi Kurokawa and Sachiko Kanamori of the NICT Security Fundamentals Laboratory for their huge contributions by examining system specifications ...
On the other hand, when the file is encrypted using the same key shared among all members using symmetric key cryptography (for example AES), then the encryption process is needed only once for all persons ...
Hybrid encryption: An encryption method that combines public key cryptography and symmetric key cryptography, which uses public key cryptography to deliver the symmetric key which is to be used to encrypt ...
doi:10.24812/nictjournal.63.2_215
fatcat:cqfs6usarbegbaaagtsnlcc4mi
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
2022
Computational Intelligence and Neuroscience
In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography. ...
Patients' confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue. ...
In [10] , cloud computing security and privacy were discussed in detail by the authors. Using cryptography techniques, they have made cloud computing more secure. ...
doi:10.1155/2022/7016554
pmid:35510050
pmcid:PMC9061039
fatcat:cxljsrodfzdgfcbcnx7odyldyi
Decentralized group key management for dynamic networks using proxy cryptography
2007
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks - Q2SWinet '07
cryptography. ...
In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy ...
In Section 2, several related works for secure group communication are described. In Section 3, a decentralized group key management scheme using proxy cryptography is proposed. ...
doi:10.1145/1298239.1298261
dblp:conf/mswim/HurSY07
fatcat:f3oaoqtlq5adlmihrco7hzqwl4
Unique Data Integrity in Public Cloud
2013
International Journal of Reliable Information and Assurance
From the security issues, we propose a novel intermediary situated information transferring and remote information honesty checking model in identity-based public key cryptography: identity-based proxy-oriented ...
New security issues must be illuminated so as to help more customers process their information out in the open cloud. ...
personality based intermediary cryptography. ...
doi:10.21742/ijria.2013.1.1.04
fatcat:jdjpnhyvhvgnvpsmrhzbzyloli
« Previous
Showing results 1 — 15 out of 5,041 results