Key establish scheme for optical encryption system based on IBE
Based on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorith...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539890641108992 |
---|---|
author | Ning XU Geng YANG |
author_facet | Ning XU Geng YANG |
author_sort | Ning XU |
collection | DOAJ |
description | Based on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorithms in terms of complexity and security was evaluated.Finally,some simulation results about two-dimensional code under two different encryption systems was given,which demonstrate the efficiency,correctness and security of the proposed mechanism. |
format | Article |
id | doaj-art-0abe8d9bf7ed48089fd80597b9e0a2e5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-0abe8d9bf7ed48089fd80597b9e0a2e52025-01-14T06:31:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-04-013312112859661700Key establish scheme for optical encryption system based on IBENing XUGeng YANGBased on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorithms in terms of complexity and security was evaluated.Finally,some simulation results about two-dimensional code under two different encryption systems was given,which demonstrate the efficiency,correctness and security of the proposed mechanism.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/identity-based cryptographycommunication securityoptical encryptiontwo-dimensional code identity |
spellingShingle | Ning XU Geng YANG Key establish scheme for optical encryption system based on IBE Tongxin xuebao identity-based cryptography communication security optical encryption two-dimensional code identity |
title | Key establish scheme for optical encryption system based on IBE |
title_full | Key establish scheme for optical encryption system based on IBE |
title_fullStr | Key establish scheme for optical encryption system based on IBE |
title_full_unstemmed | Key establish scheme for optical encryption system based on IBE |
title_short | Key establish scheme for optical encryption system based on IBE |
title_sort | key establish scheme for optical encryption system based on ibe |
topic | identity-based cryptography communication security optical encryption two-dimensional code identity |
url | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/ |
work_keys_str_mv | AT ningxu keyestablishschemeforopticalencryptionsystembasedonibe AT gengyang keyestablishschemeforopticalencryptionsystembasedonibe |