Key establish scheme for optical encryption system based on IBE

Based on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorith...

Full description

Saved in:
Bibliographic Details
Main Authors: Ning XU, Geng YANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539890641108992
author Ning XU
Geng YANG
author_facet Ning XU
Geng YANG
author_sort Ning XU
collection DOAJ
description Based on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorithms in terms of complexity and security was evaluated.Finally,some simulation results about two-dimensional code under two different encryption systems was given,which demonstrate the efficiency,correctness and security of the proposed mechanism.
format Article
id doaj-art-0abe8d9bf7ed48089fd80597b9e0a2e5
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-0abe8d9bf7ed48089fd80597b9e0a2e52025-01-14T06:31:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-04-013312112859661700Key establish scheme for optical encryption system based on IBENing XUGeng YANGBased on asymmetric identity-based encryption,a key management mechanism for optical encryption was proposed.First,the IBE scheme,particularly the Boneh-Franklin algorithm was described.Then,the algorithms for key generating,distributing and updating was presented.And the performance of the algorithms in terms of complexity and security was evaluated.Finally,some simulation results about two-dimensional code under two different encryption systems was given,which demonstrate the efficiency,correctness and security of the proposed mechanism.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/identity-based cryptographycommunication securityoptical encryptiontwo-dimensional code identity
spellingShingle Ning XU
Geng YANG
Key establish scheme for optical encryption system based on IBE
Tongxin xuebao
identity-based cryptography
communication security
optical encryption
two-dimensional code identity
title Key establish scheme for optical encryption system based on IBE
title_full Key establish scheme for optical encryption system based on IBE
title_fullStr Key establish scheme for optical encryption system based on IBE
title_full_unstemmed Key establish scheme for optical encryption system based on IBE
title_short Key establish scheme for optical encryption system based on IBE
title_sort key establish scheme for optical encryption system based on ibe
topic identity-based cryptography
communication security
optical encryption
two-dimensional code identity
url http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)04-0121-08/
work_keys_str_mv AT ningxu keyestablishschemeforopticalencryptionsystembasedonibe
AT gengyang keyestablishschemeforopticalencryptionsystembasedonibe