Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
Journal of Network and Computer Applications
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Chosen-Ciphertext Security from Identity-Based Encryption
SIAM Journal on Computing
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
An ID-based cryptosystem based on the discrete logarithm problem
IEEE Journal on Selected Areas in Communications
Key distribution system based on identification information
IEEE Journal on Selected Areas in Communications
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
Hi-index | 0.89 |
In 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the identity of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity-based cryptosystem, but only in constructing an identity-based signature scheme. In this paper, we propose an ID-based cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.