Multiparty identification scheme without certificates

Identity-based Identification (IBI) schemes permit the user to participate in the intercommunication with a verifier to prove himself to gain resources. It is the cryptographic primitive without relying on certificates. Nevertheless, IBI shcemes only support single user interaction with the verifier...

全面介绍

Saved in:
书目详细资料
主要作者: Apurva Kiran, Vangujar
格式: Thesis
出版: 2019
主题:
标签: 添加标签
没有标签, 成为第一个标记此记录!
id my-mmu-ep.12853
record_format uketd_dc
spelling my-mmu-ep.128532024-08-21T08:39:28Z Multiparty identification scheme without certificates 2019-08 Apurva Kiran, Vangujar QA71-90 Instruments and machines Identity-based Identification (IBI) schemes permit the user to participate in the intercommunication with a verifier to prove himself to gain resources. It is the cryptographic primitive without relying on certificates. Nevertheless, IBI shcemes only support single user interaction with the verifier. Under certain situations, such as group booking or a committee authentication, it may be inappropriate. A new security model is proposed in this work to examine the notion and model multiply identification schemes in detail without certificates; consolidating techniques from hierarchical, cluster structures and providing a collection of users to produce their secrect keys in varying manners with diverging security properties. 2019-08 Thesis https://shdl.mmu.edu.my/12853/ http://erep.mmu.edu.my/ masters Multimedia University Faculty of Engineering (FOE) EREP ID: 1277
institution Multimedia University
collection MMU Institutional Repository
topic QA71-90 Instruments and machines
spellingShingle QA71-90 Instruments and machines
Apurva Kiran, Vangujar
Multiparty identification scheme without certificates
description Identity-based Identification (IBI) schemes permit the user to participate in the intercommunication with a verifier to prove himself to gain resources. It is the cryptographic primitive without relying on certificates. Nevertheless, IBI shcemes only support single user interaction with the verifier. Under certain situations, such as group booking or a committee authentication, it may be inappropriate. A new security model is proposed in this work to examine the notion and model multiply identification schemes in detail without certificates; consolidating techniques from hierarchical, cluster structures and providing a collection of users to produce their secrect keys in varying manners with diverging security properties.
format Thesis
qualification_level Master's degree
author Apurva Kiran, Vangujar
author_facet Apurva Kiran, Vangujar
author_sort Apurva Kiran, Vangujar
title Multiparty identification scheme without certificates
title_short Multiparty identification scheme without certificates
title_full Multiparty identification scheme without certificates
title_fullStr Multiparty identification scheme without certificates
title_full_unstemmed Multiparty identification scheme without certificates
title_sort multiparty identification scheme without certificates
granting_institution Multimedia University
granting_department Faculty of Engineering (FOE)
publishDate 2019
_version_ 1811768009016999936