ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Sharing Without Disclosing: Analysis on the Protocols

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 147-149

Keywords : Cryptography; erasures; smart cards; secure computation; sharing data.;

Source : Downloadexternal Find it from : Google Scholarexternal


In many of today’s business and government identity programs, smart cards based application are becoming more prevalent .strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like encryption and digital signature. In many applications it is important to share information without exposing private details. In this paper we will find ways to protect data while also allowing it to be compared with other party.

Last modified: 2014-02-04 19:44:36