Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Jui-Di Wu"'
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 1, Pp 131-144 (2020)
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not pr
Externí odkaz:
https://doaj.org/article/4f1f20362dcd4b6c9e9cc9098a7ab53b
Publikováno v:
IEEE Access, Vol 7, Pp 19041-19053 (2019)
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography. R
Externí odkaz:
https://doaj.org/article/44e54294dc5b48ee91daeadca567d662
Publikováno v:
IEEE Access, Vol 6, Pp 17130-17142 (2018)
Based on users’ permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recentl
Externí odkaz:
https://doaj.org/article/084a1bda839d47c7aeed8cc67c0f3acb
Publikováno v:
Informatica. 2020, Vol. 31 Issue 3, p597-620. 24p.
Publikováno v:
Informatica. 2018, Vol. 29 Issue 1, p125-155. 31p.
Publikováno v:
Information Technology And Control. 49:464-481
Certificateless public-key system (CL-PKS) is a significant public-key cryptography and it solves both the key escrow and certificate management problems. Outsourced revocable certificateless public-key system (ORCL-PKS) with a cloud revocation serve
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 1, Pp 131-144 (2020)
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not pr
Publikováno v:
Informatica. :597-620
Publikováno v:
IEEE Systems Journal. 13:3968-3979
Identity-based authenticated key exchange (ID-AKE) protocol is an important cryptographic primitive, which is used to establish a session key between two communication participants while authenticating each other. Indeed, most of the existing ID-AKE
Publikováno v:
Informatica. 30:595-612