Rizvi et al., 2010 - Google Patents
Combining private and public key encryption techniques for providing extreme secure environment for an academic institution applicationRizvi et al., 2010
View PDF- Document ID
- 15742876218395749988
- Author
- Rizvi S
- Riasat A
- Elleithy K
- Publication year
- Publication venue
- International Journal of Network Security & Its Application (IJNSA)
External Links
Snippet
This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the …
- 238000000034 method 0 title description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3602952B1 (en) | Method and system for identity and access management for blockchain interoperability | |
| EP2348446B1 (en) | A computer implemented method for authenticating a user | |
| Sharma et al. | Blockchain-based cloud storage system with CP-ABE-based access control and revocation process | |
| CN105122265B (en) | Data safety service system | |
| Cheng | Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm | |
| US9698974B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
| CN113826096B (en) | User authentication and signature device and method using user biometric identification data | |
| Rivera et al. | Secure communications and protected data for a Internet of Things smart toy platform | |
| CN109981287A (en) | A kind of code signature method and its storage medium | |
| Arapinis et al. | Privacy-supporting cloud computing by in-browser key translation | |
| Guo et al. | Using blockchain to control access to cloud data | |
| Shajina et al. | A novel dual authentication protocol (DAP) for multi-owners in cloud computing | |
| Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
| Chou et al. | Security development in Web Services environment | |
| Sharma et al. | A two-tier security solution for storing data across public cloud | |
| Sankari et al. | Dynamic access control through cryptography in cloud | |
| Wadhwa et al. | Framework for user authenticity and access control security over a cloud | |
| Rizvi et al. | Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application | |
| Agarwal et al. | A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation | |
| Bannore et al. | Proxy signature-based role delegation scheme: formal analysis and simulation | |
| Yang et al. | COIChain: Blockchain scheme for privacy data authentication in cross-organizational identification | |
| Irimia | Decentralized Infrastructure for Digital Notarizing, Signing and Sharing Files Securely using Blockchain | |
| Elmufti et al. | Anonymous authentication for mobile single sign-on to protect user privacy | |
| Friebe | Secure and Privacy-preserving Decentralized Identities | |
| Krutz et al. | The CISM prep Guide: Mastering the five Domains of Information security management |