Sharing Without Disclosing: Analysis on the Protocols
Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 2)Publication Date: 2014-02-01
Authors : Azra siddiqui Shumail Ahmad Siddiqui;
Page : 147-149
Keywords : Cryptography; erasures; smart cards; secure computation; sharing data.;
Abstract
In many of today’s business and government identity programs, smart cards based application are becoming more prevalent .strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like encryption and digital signature. In many applications it is important to share information without exposing private details. In this paper we will find ways to protect data while also allowing it to be compared with other party.
Other Latest Articles
- Estimation of rain induced Specific attenuation
- IJSET@2014 Page 139 Public Key Encryption without using Certificate based on Identity Based Cryptography
- Dyeing of Polyester Using Crude Disperse Dyes by Nanoemulsion Technique
- Mechanical Behaviour of Geopolymer Concrete under Ambient Curing
- An Approach to Integrate Geographic Information Systems to the proposed Smart Grid for Dhaka, Bangladesh
Last modified: 2014-02-04 19:44:36