In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...