[go: up one dir, main page]

Rizvi et al., 2010 - Google Patents

Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application

Rizvi et al., 2010

View PDF
Document ID
15742876218395749988
Author
Rizvi S
Riasat A
Elleithy K
Publication year
Publication venue
International Journal of Network Security & Its Application (IJNSA)

External Links

Snippet

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Similar Documents

Publication Publication Date Title
EP3602952B1 (en) Method and system for identity and access management for blockchain interoperability
EP2348446B1 (en) A computer implemented method for authenticating a user
Sharma et al. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process
CN105122265B (en) Data safety service system
Cheng Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
CN113826096B (en) User authentication and signature device and method using user biometric identification data
Rivera et al. Secure communications and protected data for a Internet of Things smart toy platform
CN109981287A (en) A kind of code signature method and its storage medium
Arapinis et al. Privacy-supporting cloud computing by in-browser key translation
Guo et al. Using blockchain to control access to cloud data
Shajina et al. A novel dual authentication protocol (DAP) for multi-owners in cloud computing
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Chou et al. Security development in Web Services environment
Sharma et al. A two-tier security solution for storing data across public cloud
Sankari et al. Dynamic access control through cryptography in cloud
Wadhwa et al. Framework for user authenticity and access control security over a cloud
Rizvi et al. Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application
Agarwal et al. A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation
Bannore et al. Proxy signature-based role delegation scheme: formal analysis and simulation
Yang et al. COIChain: Blockchain scheme for privacy data authentication in cross-organizational identification
Irimia Decentralized Infrastructure for Digital Notarizing, Signing and Sharing Files Securely using Blockchain
Elmufti et al. Anonymous authentication for mobile single sign-on to protect user privacy
Friebe Secure and Privacy-preserving Decentralized Identities
Krutz et al. The CISM prep Guide: Mastering the five Domains of Information security management