Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
The official PGP user's guide
PKI: It's Not Dead, Just Resting
Computer
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Hi-index | 0.01 |
In ubiquitous computing environments, a user can utilize a certain service in anywhere and anytime using any devices, then authentication and authorization are crucial for security in pervasive computing. In this paper, we propose a new ID-based access control model adequate for ubiquitous computing. We eliminate the use of X.509 certificates of trusted parties for authentication and allow ID-based authority delegations for flexible access control in distributed networks. We implement our proposed model using a bilinear map such as Weil pairing, and we prove the security of the proposed model against chosen-message attack under the random oracle model.