Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Security of improved identity-based conference key distribution systems
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Toward a national public key infrastructure
IEEE Communications Magazine
Hi-index | 0.24 |
Recently, the public key infrastructure has become increasingly important for cryptographic schemes. Little research has been done, however, on the design of public key infrastructures. Although the public key infrastructure can be solved using the current standard X.509, it has not proved to be efficient when the required security level is high. In this paper, we introduce a two-level public key infrastructure. It provides a more practical and competitive application than X.509.