Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,324 papers from all fields of science
Search
Sign In
Create Free Account
ID-based cryptography
Known as:
Identity Based Public Key Cryptography
, IDPKC
, Cocks Identity Based Encryption
Expand
Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Certificate-based encryption
Certificateless cryptography
ID-based encryption
Identity-based conditional proxy re-encryption
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ID Based Cryptography for Cloud Data Storage
N. Kaaniche
,
Aymen Boudguiga
,
M. Laurent
IEEE Sixth International Conference on Cloud…
2013
Corpus ID: 14346129
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the…
Expand
2010
2010
Opportunistic node authentication in intermittently connected mobile ad hoc networks
Yaozhou Ma
,
A. Jamalipour
Asia-Pacific Conference on Communications
2010
Corpus ID: 43853588
Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically…
Expand
2010
2010
An identity-based authentication and key establishment scheme for multi-operator maintained Wireless Mesh Networks
Bing He
,
D. Agrawal
The 7th IEEE International Conference on Mobile…
2010
Corpus ID: 33195791
Wireless Mesh Networks (WMNs) offer broadband wireless Internet access with flexible and cost-effective deployment. Security is…
Expand
Highly Cited
2009
Highly Cited
2009
Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
Xuefei Cao
,
Xing Zeng
,
W. Kou
,
Liang Hu
IEEE Transactions on Vehicular Technology
2009
Corpus ID: 13509967
Based on identity-based cryptography, this paper proposes a remote authentication protocol featured with client anonymity…
Expand
2008
2008
Mobile ad-hoc network key management with certificateless cryptography
Zhenfei Zhang
,
Willy Susilo
,
R. Raad
International Conference on Signal Processing and…
2008
Corpus ID: 2158195
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network…
Expand
2008
2008
Grid authentication from identity-based cryptography without random oracles
Yan Zheng
,
Haiyan Wang
,
Ruchuan Wang
2008
Corpus ID: 62558601
Review
2008
Review
2008
Building secure user-to-user messaging in mobile telecommunication networks
Shushan Zhao
,
A. Aggarwal
,
Shuping Liu
Wireless Telecommunications Symposium
2008
Corpus ID: 20078512
Short Message Service (SMS) and Multimedia Message Service (MMS) are popularly used and will be more popular in the future…
Expand
2007
2007
Key Refreshing in Identity-Based Cryptography and its Applications in MANETs
S. Balfe
,
K. D. Boklan
,
Z. Klagsbrun
,
K. Paterson
IEEE Military Communications Conference
2007
Corpus ID: 35152085
This paper introduces a lightweight and secure framework enabling the refreshing of private keys in identity-based public key…
Expand
2005
2005
Lightweight Encryption for Email
B. Adida
,
S. Hohenberger
,
R. Rivest
Workshop on Steps to Reducing Unwanted Traffic on…
2005
Corpus ID: 14490646
Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key…
Expand
2002
2002
Identity-Based Mediated RSA ?
D. Boneh
,
Xuhua Ding
,
G. Tsudik
2002
Corpus ID: 7494788
Identity-based encryption (IBE) [5] and digital signatures are important tools in modern secure communication. In general…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE