Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Pairing-based public-key encryption schemes with backward-and-forward security

    20810_downloaded_stream_266.pdf (102.6Kb)
    20809_downloaded_stream_265.pdf (2.644Mb)
    Access Status
    Open access
    Authors
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam S.
    Date
    2008
    Type
    Journal Article
    
    Metadata
    Show full item record
    Citation
    Han, Song and Chang, Elizabeth and Dillon, Tharam. 2008. Pairing-based public-key encryption schemes with backward-and-forward security. International Journal of Computer Systems Science and Engineering. 23 (1): 303-308.
    Source Title
    International Journal of Computer Systems Science and Engineering
    Additional URLs
    http://www.crlpublishing.co.uk/journal.asp?j=csse&s=Vol 23 2008
    Faculty
    Curtin Business School
    School
    Centre for Extended Enterprises and Business Intelligence
    URI
    http://hdl.handle.net/20.500.11937/20535
    Collection
    • Curtin Research Publications
    Abstract

    Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate management. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.

    Related items

    Showing items related by title, author, creator and subject.

    • A new encryption algorithm over elliptic curve
      Han, Song; Chang, Elizabeth; Liu, Wan-quan; Potdar, Vidyasagar; Wang, J. (2005)
      Various public key encryption systems have been proposed in modern information techology. Some of them have also been used in various applications, such as E-commerce and mobile database. This paper proposes two secure ...
    • A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
      Tian, Biming; Han, Song; Parvin, Sazia; Dillon, Tharam S. (2010)
      The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed ...
    • Towards enhanced key management in multi-phase ZigBee network architecture
      Tian, Biming; Han, Song; Liu, Liu; Khadem, Saghar; Parvin, Sazia (2011)
      ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.