Signature Schemes
Mostrando 1-3 de 3 artigos, teses e dissertações.
-
1. Comparação analítica dos esquemas de autenticação em sistemas P2P de live streaming / Comparative analisys of authentication schemes in P2P live streaming
P2P live streaming applications have great potential for improvements in terms of popularity as well as quality. However, they are subject to pollution attacks, in which a malicious user tampers with audio/video of streams in order to trick other users. The authentication of blocks in a stream allows the detection of pollution in received content and can lea
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 2011
-
2. Identity-based cryptography environment. / Um ambiente criptográfico baseado na identidade.
The accelerated growth of Internet-based business increase significantly the need for mechanisms that can guarantee the data confidentiality, providing tools for authenticity and non-repudiation users in any medium of communication, even with computer resources becoming increasingly scarce, eg into a cell phone. This paper describes an encryption scheme that
Publicado em: 2008
-
3. "Proposal for encryption and signature schemes under certificateless public key cryptography model" / "Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de chave pública sem certificado"
Under the model of Identity Based Cryptography (ID-PKC), the public key can be the user s identity, therefore it does not require a Public Key Infrastructure (PKI) with its complex management of Digital Certificates. On the other hand, this system requires a Private Key Generator (PKG), a trusted authority who is in possession of a master key and can generat
Publicado em: 2006