TITLE

New technology could simplify encryption management

PUB. DATE
November 2006
SOURCE
Secured Lender;Nov/Dec2006, Vol. 62 Issue 6, p146
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on identity-based encryption (IBE) system designed to solve the shortcomings of public key infrastructure (PKI) encryption. A typical PKI requires users to register with a certificate authority to receive a pair of keys that encrypt and decrypt messages. IBE systems do not require users to register to access the encryption mechanisms but instead allow them to rely on unique identifiers. IBE systems automatically revalidate all keys so companies do not need to revoke key addresses.
ACCESSION #
23105421

 

Related Articles

  • Cryptanalysis of Hwang et al.'s Improved Encryption Scheme. Dezhi Gao; Xiangqian Liang // Journal of Systems Science & Information;Jun2009, Vol. 7 Issue 2, p159 

    Recently, Tseng et al. proposed authenticated encryption scheme with message recovery using self-certified public keys. Hwang et al. proposed an attack to show that the Tseng et al.'s scheme was not secure. And Hwang et al. proposed an improved scheme and claimed to that the new scheme satisfy...

  • Breaking four mix-related schemes based on Universal Re-encryption. Danezis, George // International Journal of Information Security;Oct2007, Vol. 6 Issue 6, p393 

    Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymous communications protocols. In this work we analyze four schemes related to mix networks that make use of Universal...

  • Public-key encryption based on generalized synchronization of coupled map lattices. Xingang Wang; Xiaofeng Gong; Meng Zhan; Choy Heng Lai // Chaos;Jun2005, Vol. 15 Issue 2, p023109 

    Currently used public-key cryptosystems are based on difficulties in solving certain numeric theoretic problems, in which the way to predict the private key from the knowledge of the public key is computationally infeasible. Here we propose a method of constructing public-key cryptosystems by...

  • A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. Lindell, Yehuda // Journal of Cryptology;Summer2006, Vol. 19 Issue 3, p359 

    In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the...

  • EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY. Vivek, S. Sree; Selvi, S. Sharmila Deva; Radhakishan, V.; Rangan, C. Pandu // International Journal of Network Security & Its Applications;Mar2012, Vol. 4 Issue 2, p179 

    In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the...

  • Visual Cryptography Schemes with Reversing. Ching-Nung Yang; Chung-Chun Wang; Tse-Shih Chen // Computer Journal;2008, Vol. 51 Issue 6, p710 

    The Visual cryptography scheme (VCS) is a perfect secure method that encrypts a secret image by breaking it into shadow images. A distinctive property of VCS is that one can visually, without computation, decode the secret by superimposing shadow images. However, much of the contrast of the...

  • Modern Promising Algorithm to avoid Spoof Attack by Cryptography. Murthy, K. N. B.; Sudheendra, H. // Proceedings of World Academy of Science: Engineering & Technolog;Aug2008, Vol. 44, p690 

    In public key cryptography? the security ?f private keys ?s ?f vital importance. If ? private key ?s ever compromised ?t can be used t? sign forge documents ?r t? decrypt secret messages. Conventional methods such ?s password-based encryption that are used for safe custody ?f private keys do not...

  • Parallel Joint Channel Coding and Cryptography. Živić, Nataša; Ruland, Christoph // Proceedings of World Academy of Science: Engineering & Technolog;Jul2008, Vol. 43, p536 

    Method of Parallel Joint Channel Coding and Cryptography has been analyzed and simulated in this paper. The method is an extension of Soft Input Decryption with feedback, which is used for improvement of channel decoding of secured messages. Parallel Joint Channel Coding and Cryptography results...

  • Cryptology as Mathematical Model. Neamţu, Iosif Mircea; Gacsádi, Alexandru // Journal of Computer Science & Control Systems;2010, Vol. 3 Issue 1, p147 

    This paper presents some mathematical models used for encryption. By using encryption mechanisms, the information security becomes collision resistant.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics