메뉴 건너뛰기




Volumn , Issue , 2012, Pages 179-185

EIBC: Enhanced identity-based cryptography, a conceptual design

Author keywords

Identity Based Cryptography; Key Management; Security

Indexed keywords

COMMUNICATION OVERHEADS; CONTROL PACKETS; EFFICIENT AUTHENTICATION; ENCRYPTION AND DECRYPTION; HANDLING SYSTEMS; IDENTITY BASED CRYPTOGRAPHY; KEY MANAGEMENT; KEY MANAGEMENT MECHANISM; MULTICAST GROUPS; PRIVATE KEY; SECURITY; SIGNATURE SCHEME; SMART GRID; SYSTEM SECURITY;

EID: 84861325316     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SysCon.2012.6189541     Document Type: Conference Paper
Times cited : (12)

References (9)
  • 1
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • Advances in Cryptology - CRYPTO, Springer- Verlag
    • A. Shamir, "Identity-based Cryptosystems and Signature Schemes," Advances in Cryptology - CRYPTO, LNCS 196, pages 47-53, Springer- Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO, Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Advances in Cryptology - CRYPTO, LNCS 2139, pages 213- 229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 79551608946 scopus 로고    scopus 로고
    • Elliptic curve cryptography: The serpentine course of a paradigm shift
    • May
    • A. H. Koblitz, N. Koblitz and A. Menezes, "Elliptic curve cryptography: The serpentine course of a paradigm shift," Elsevier Journal of Number Theory, Vol. 131, Issue 5, pages 781-813, May 2011.
    • (2011) Elsevier Journal of Number Theory , vol.131 , Issue.5 , pp. 781-813
    • Koblitz, A.H.1    Koblitz, N.2    Menezes, A.3
  • 4
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • ASI-ACRYPT, Springer-Verlag
    • C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," ASI-ACRYPT, LNCS 2501, pages 548-566, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.