Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Identity-based public key cryptosystem may perfectly substitute the traditional certificate-based public key system if only the efficiency and security of key issuing are satisfied. Recently, interacting neural network has been studied with a novel result that the two neural networks can synchronize to a stationary weight space with the identical inputs. So we propose a tree parity machine model for secure key agreement purpose, and ID-based private key secure issuing over a complete public channel, as well as secure authentication to user, are all proposed in this paper.