Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography
暂无分享,去创建一个
Mohammad S. Obaidat | Sarita Gajbhiye Meshram | Chandrashekhar Meshram | M. Obaidat | S. G. Meshram | C. Meshram
[1] Josep Domingo-Ferrer,et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts , 2014, Inf. Sci..
[2] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[3] Xiong Li,et al. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications , 2016, Journal of Medical Systems.
[4] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[5] Md Zakirul Alam Bhuiyan,et al. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.
[6] Cheng-Chi Lee,et al. An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP , 2017, Informatica.
[7] Li Xu,et al. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.
[8] Wei-Bin Lee,et al. Constructing identity-based cryptosystems for discrete logarithm based cryptosystems , 2004, J. Netw. Comput. Appl..
[9] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[10] Mingwu Zhang,et al. An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..
[11] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[14] Cheng-Chi Lee,et al. A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..
[15] Athanasios V. Vasilakos,et al. An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.
[16] Xiong Li,et al. A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2017, Wirel. Pers. Commun..
[17] Chandrashekhar Meshram,et al. Factoring and Discrete Logarithm using IBC , 2015 .
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[20] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[21] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[22] Chandrashekhar Meshram,et al. An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..
[23] Maged Hamada Ibrahim,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..
[24] Yevgeniy Vahlis,et al. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.
[25] Chandrashekhar Meshram,et al. An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..
[26] Xiong Li,et al. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks , 2016, Secur. Commun. Networks.
[27] Josep Domingo-Ferrer,et al. Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security , 2014, Inf. Sci..
[28] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[29] Cheng-Chi Lee,et al. An IBE Technique Using Partial Discrete Logarithm , 2016 .
[30] Azman Samsudin,et al. A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp , 2010 .
[31] G. P. Biswas,et al. Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme , 2016, Secur. Commun. Networks.