Identity-based cryptography environment. / Um ambiente criptográfico baseado na identidade.
AUTOR(ES)
Mehran Misaghi
DATA DE PUBLICAÇÃO
2008
RESUMO
The accelerated growth of Internet-based business increase significantly the need for mechanisms that can guarantee the data confidentiality, providing tools for authenticity and non-repudiation users in any medium of communication, even with computer resources becoming increasingly scarce, eg into a cell phone. This paper describes an encryption scheme that uses personal data for key generation and encryption, called the Identity Based Encryption, without need for a digital certificate. Various encryption schemes, signature, key agreement are shown, and its main characteristics, operational differences and their respective relevant aspects of security. Some aplicabilities such as encrypted data search, for example, are implemented, for better understanding of the operations and stages involved. The comparative computataional costs of operations highlight the Barreto et al. (2005) signature scheme and McCullagh e Barreto (2004b) key agreement scheme. They are also described, the prerequisites of an Identity-based cryptography environment, which allows to perform the operations of encryption, signing and key agreement with lower computational cost possible.
ASSUNTO(S)
busca cifrada identity-based cryptography aplicabilidades key agreement schemes encryption schemes esquemas de acordo de chaves esquemas de assinatura criptografia baseada na identidade signature schemes esquemas de cifração
Documentos Relacionados
- Um ambiente de aprendizagem em automação baseado em sistemas nebulosos
- A development environment based on adaptive decision tables.
- Um ambiente de multiprojeção totalmente imersivo baseado em aglomerados de computadores.
- A new cryptography method based on the pre-image calculus of chaotic, non-homogeneous and non-additive cellular automata
- Memórias, línguas e identidade. Identificação linguístico-cultural na condição judaica