Angebote zu "Scheme" (24 Treffer)

Kategorien

Shops

Time Stamped Proxy Blind Signature Scheme with ...
41,10 € *
ggf. zzgl. Versand

Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. It gives a detail about the proxy blind signature scheme with proxy revocation which records the time stamp during proxy signing phase, based on Discrete logarithmic problem and one of its application in e-voting.

Anbieter: Dodax AT
Stand: 17.01.2020
Zum Angebot
Kar, Jayaprakash: Proxy Blind Multi-Signature S...
49,00 € *
ggf. zzgl. Versand

Erscheinungsdatum: 06/2011, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Proxy Blind Multi-Signature Scheme, Titelzusatz: Proxy Blind Multi-signature Scheme Using Elliptic Curve Cryptography for Handheld Devices, Autor: Kar, Jayaprakash, Verlag: LAP Lambert Acad. Publ., Sprache: Englisch, Rubrik: Informatik, Seiten: 64, Informationen: Paperback, Gewicht: 115 gr, Verkäufer: averdo

Anbieter: averdo
Stand: 17.01.2020
Zum Angebot
Proxy Blind Multi-Signature Scheme
49,00 € *
ggf. zzgl. Versand

This articles describes an efficient proxy blindmulti-signature scheme using Elliptic CurveCryptography. Also describes its implementationissues i.e efficiency and size of the hardware. InECC, computationally the most expensive operation isscalar multiplication and also very important fromsecurity point of view. The implementation attacksgenerally target the computation of this operation tobreak the cryptosystem. The security of the proposedschemes is based on the difficulty of breaking theone-way hash function and the elliptic curve discretelogarithm problem (ECDLP). Best algorithm knownsolving ECDLP takes fully-exponential time. Incontrast sub-exponential time algorithms known forIFP and DLP. The attractiveness of ECC will increaserelative to other public-key cryptosystems, ascomputing power improvements force a general increasein the key size. The benefits of this higher-strengthper-bit include higher speeds, lower powerconsumption, bandwidth savings and storageefficiencies. The proposed scheme can be implementedin mobile devices such as smart card, PDA etc wherebandwidth,processing capacity, power availability, orstorage are constrained.

Anbieter: Dodax
Stand: 17.01.2020
Zum Angebot
Proxy Blind Multi-Signature Scheme
50,40 € *
ggf. zzgl. Versand

This articles describes an efficient proxy blindmulti-signature scheme using Elliptic CurveCryptography. Also describes its implementationissues i.e efficiency and size of the hardware. InECC, computationally the most expensive operation isscalar multiplication and also very important fromsecurity point of view. The implementation attacksgenerally target the computation of this operation tobreak the cryptosystem. The security of the proposedschemes is based on the difficulty of breaking theone-way hash function and the elliptic curve discretelogarithm problem (ECDLP). Best algorithm knownsolving ECDLP takes fully-exponential time. Incontrast sub-exponential time algorithms known forIFP and DLP. The attractiveness of ECC will increaserelative to other public-key cryptosystems, ascomputing power improvements force a general increasein the key size. The benefits of this higher-strengthper-bit include higher speeds, lower powerconsumption, bandwidth savings and storageefficiencies. The proposed scheme can be implementedin mobile devices such as smart card, PDA etc wherebandwidth,processing capacity, power availability, orstorage are constrained.

Anbieter: Dodax AT
Stand: 17.01.2020
Zum Angebot
Panda, S: Time Stamped Proxy Blind Signature Sc...
39,90 € *
ggf. zzgl. Versand

Erscheinungsdatum: 12.02.2015, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Time Stamped Proxy Blind Signature Scheme with Proxy Revocation, Autor: Panda, Suryakanta, Verlag: LAP Lambert Academic Publishing, Sprache: Englisch, Schlagworte: Computernetzwerke und maschinelle Kommunikation, Rubrik: Datenkommunikation // Netze, Mailboxen, Seiten: 60, Informationen: Paperback, Gewicht: 106 gr, Verkäufer: averdo

Anbieter: averdo
Stand: 17.01.2020
Zum Angebot
Pairing-free Proxy Signature based on ECDLP
64,90 € *
ggf. zzgl. Versand

This book contributes to the variants of proxy signature scheme based on ECDLP without pairing. Significance of the scheme in chapters is not only to provide a secure and improved signature protocol but to enhance the efficiency of the scheme in the sense of computational operation-time with compare to the other available ID-based proxy signature schemes from pairings. These schemes do not use pairings still provid signatures in ID based settings. I believe that these signature schemes with formal security model without bilinear pairings will be helpful to bring a breakthrough towards the improvement of efficiency and security proofs of such schemes. I also believe that this work will be helpful for new researchers to enhance their interest in this field and to extend the related research in future with a vast list of references.

Anbieter: Dodax
Stand: 17.01.2020
Zum Angebot
Pairing-free Proxy Signature based on ECDLP
66,80 € *
ggf. zzgl. Versand

This book contributes to the variants of proxy signature scheme based on ECDLP without pairing. Significance of the scheme in chapters is not only to provide a secure and improved signature protocol but to enhance the efficiency of the scheme in the sense of computational operation-time with compare to the other available ID-based proxy signature schemes from pairings. These schemes do not use pairings still provid signatures in ID based settings. I believe that these signature schemes with formal security model without bilinear pairings will be helpful to bring a breakthrough towards the improvement of efficiency and security proofs of such schemes. I also believe that this work will be helpful for new researchers to enhance their interest in this field and to extend the related research in future with a vast list of references.

Anbieter: Dodax AT
Stand: 17.01.2020
Zum Angebot
Advances in Computer Science, Information Secur...
76,99 € *
ggf. zzgl. Versand

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Anbieter: Dodax AT
Stand: 17.01.2020
Zum Angebot
Service Provisioning for Federated Personal Net...
60,70 € *
ggf. zzgl. Versand

In Fednet, there are two approaches for providing the services. One is overlay and the other is proxy-based. Each of the approaches has the advantages and drawbacks. To trade off between these two approaches, we propose a new scheme, which can make the way of service provisioning in Fednet flexible and adaptable to the changing environment and the user s preference. Some modules are designed in the Fednet agent (FA), Fednet manager (FM) and the service proxy to support our new mechanism. To fully illustrate the concept of Fednet and the service provisioning in Fednet, we implement a Fednet prototype. It shows us how the Fednet is formed and how messages are exchanged between the FA and the FM. With the aim of proving our decision making algorithms can make decisions according to the user s requirements and the changing context, some simulations and a real test bed experiment based on one or two parameters are carried out. The simulations results show that our new service provisioning mechanism could make the way of service provisioning flexible and adaptable as we have expected.

Anbieter: Dodax AT
Stand: 17.01.2020
Zum Angebot