Return to search

Kriptoschemos identifikacinės informacijos pagrindu / Identy based cryptoschemes

Identy based cryptography has been, for a few recent years, the most active area of research and currently is of a great interest to the researchers groups. In general case the root of ID based cryptography is that user identifying data is used like a public key and so is no need of certificates for the user authentification. In this work we survey a few basic the most influent cryptoschemes. We attempt to answer what is needed for constructing an efficient IBE scheme. There are trustworthy cryptoschemes that uses elliptic curves and bilinear pairings in nowadays. We use these mathematical implements for efficient cryptoscheme too. And finally, there is a pilot software realization for this scheme.

Identiferoai:union.ndltd.org:LABT_ETD/oai:elaba.lt:LT-eLABa-0001:E.02~2006~D_20060608_154838-90936
Date08 June 2006
CreatorsKirna, Aurelijus
ContributorsKulvietis, Genadijus, Bartkus, Jonas, Martinaitytė, Laima, Turskienė, Sigita, Steuding, Rasa, Sakalauskas, Leonidas, Giedrimas, Vaidas, Sirius, Vaclovas, Siauliai University
PublisherLithuanian Academic Libraries Network (LABT), Siauliai University
Source SetsLithuanian ETD submission system
LanguageLithuanian
Detected LanguageEnglish
TypeMaster thesis
Formatapplication/pdf
Sourcehttp://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060608_154838-90936
RightsUnrestricted

Page generated in 0.4792 seconds