Nothing Special   »   [go: up one dir, main page]

Malik et al., 2011 - Google Patents

Novel authentication system using visual cryptography

Malik et al., 2011

Document ID
6967819436503900887
Author
Malik S
Aggarwal A
Sardana A
et al.
Publication year
Publication venue
2011 World Congress on Information and Communication Technologies

External Links

Snippet

An array of encryption techniques has been proposed for providing data security. However, most of the traditional cryptography methods require complex algorithms for encryption and decryption. Visual cryptography is a technique which provides confidentiality without any …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

Similar Documents

Publication Publication Date Title
Malik et al. Novel authentication system using visual cryptography
Ullah et al. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Qadir et al. A review paper on cryptography
US11336446B2 (en) System and method for generating and depositing keys for multi-point authentication
CN104243494B (en) A kind of data processing method
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
Kulyk et al. Coercion-resistant proxy voting
CN111541652B (en) System for improving security of secret information keeping and transmission
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
Singamaneni et al. A novel multi-qubit quantum key distribution Ciphertext-policy attribute-based encryption model to improve cloud security for consumers
Zhang et al. A High‐Quality Authenticatable Visual Secret Sharing Scheme Using SGX
Guo et al. A novel quantum proxy blind signature scheme
Sen et al. Find out the innovative techniques of data sharing using cryptography by systematic literature review
CN106487495B (en) Lightweight RFID authentication method based on integer chaos
Al-Saidi et al. Password authentication based on fractal coding scheme
CN110113152B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and digital signature
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
Kumar et al. User authentication using visual cryptography
Li An improved lightweight and privacy preserving authentication scheme for smart grid communication
Choudhury et al. Cryptanalysis of ‘A novel user-participating authentication scheme’
Zhou et al. Fast Settlement Scheme of Aviation Business Privacy Preservation Based on Consortium Blockchain
CN110519223B (en) Anti-quantum computing data isolation method and system based on asymmetric key pair
Adjei et al. Anonymous Signcryption for Securing Knowledge Management System
Take et al. E-certificate generation using blockchain for p2p network: An overview