ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers

M Kumar, S Chand - Multimedia Tools and Applications, 2019 - Springer
Digital certificate validation associated with traditional public key cryptosystems make it
impractical in real-world environments due to their storage cost. The identity-based …

A secure lightweight signature based authentication for Cloud‐IoT crowdsensing environments

M Kumar, HK Verma, G Sikka - Transactions on Emerging …, 2019 - Wiley Online Library
Crowdsensing utilizes the wisdom of crowd by sensing the information through different
types of smart devices such as a smartphone, tablet, and sensors to serve the problem of …

[PDF][PDF] Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes

M Patel, R Patel - 2022 - academia.edu
In computer based system, key for the problem of identification, authentication and secrecy
can be found in the field of cryptography. Dependence on public key infrastructure and to …

[PDF][PDF] Identity Based Encryption and Identity Based Signature Scheme on Security Schemes

M Patel, R Patel - researchgate.net
In computer based system, key for the problem of identification, authentication and secrecy
can be found in the field of cryptography. Dependence on public key infrastructure and to …