Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A secure signature scheme from bilinear maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Hi-index | 0.00 |
We suggest a new intelligent ID-based threshold secure system by an encryption and decryption protocol using (k, n)-threshold scheme which only k agents or more are engaged to reconstruct an encrypted data for a mobile intelligent system. Security issue protecting the network communication can be resolved by applying the Security Socket Layer. But the issue protecting the host against agent and the agent against malicious host can't be resolve with this SSL. We aim that a protocol has to allow hosts to send and receive safely an encrypted data from the agents, even if some of the agents are compromised under the multi-agent roaming system. Since our secure system have the verification, the hosts and agents can be protected from each other.