Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system
Information Processing Letters
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A New ID-Based Key Sharing System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A remark on a non-interactive public-key distribution system
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
New directions in cryptography
IEEE Transactions on Information Theory
A simple ID-based scheme for key sharing
IEEE Journal on Selected Areas in Communications
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
Identity-based information security management system for personal computer networks
IEEE Journal on Selected Areas in Communications
An ID-based cryptosystem based on the discrete logarithm problem
IEEE Journal on Selected Areas in Communications
Key distribution system based on identification information
IEEE Journal on Selected Areas in Communications
Research note: Cryptanalysis of Lee and Chang's ID-based information security functions
Computer Communications
Hi-index | 0.24 |
In this paper, we shall propose several new identity-based information security functions, including an authenticated key distribution scheme, a cryptosystem, as well as a digital signature scheme. Their security analyses are based on the difficulty of solving factorization, discrete logarithms moduloing a composite numbers, and the Diffie-Hellman problem.