Keyword : identity-based cryptography


Pseudonym and Key Management Scheme for Supporting Social Smart Applications
Yusuke FUKUSHIMA Ved P. KAFLE Hiroaki HARAI 
Publication:   
Publication Date: 2018/08/01
Vol. E101-B  No. 8 ; pp. 1775-1786
Type of Manuscript:  Special Section PAPER (Special Section on Autonomous Decentralized Systems Technologies and Approaches Innovation through Structure Change of Society and Life)
Category: 
Keyword: 
internet of thingspseudonymprivacy-preserving wireless communicationidentity-based cryptography
 Summary | Full Text:PDF(2.1MB)

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
Ying SUN Yong YU Xiaosong ZHANG Jiwen CHAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3 ; pp. 721-723
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy signatureidentity-based cryptographystandard model
 Summary | Full Text:PDF(72.6KB)

An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks
Ren Junn HWANG Yu-Kai HSIAO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/09/01
Vol. E95-B  No. 9 ; pp. 2718-2727
Type of Manuscript:  Special Section PAPER (Special Section on Emerging Technologies and Applications for Ad Hoc and Wireless Mesh Networks)
Category: 
Keyword: 
asymmetric linkwireless mesh networkssecures routingidentity-based cryptography
 Summary | Full Text:PDF(1.5MB)

Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
Xuefei CAO Weidong KOU Yong YU Rong SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/12/01
Vol. E91-A  No. 12 ; pp. 3833-3836
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
identity-based cryptographyauthenticated key agreementbilinear pairingelliptic curve
 Summary | Full Text:PDF(82KB)