Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Better Login Protocols for Computer Networks
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
Secure and efficient key management for dynamic multicast groups
ACM SIGOPS Operating Systems Review
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
This paper introduces ID-based secret-key cryptography, in which secret keys are privately and uniquely binded to an identity. This enables to extend public-key cryptography features at the high throughput rate of secret-key cryptography. As applications, efficient login protocols, an enhanced version of Kerberos, and an ID-based MAC algorithm are presented.ID-based systems were initially developed in the context of public-key cryptography by removing the need of explicit public keys. The idea was to derive, in a publicly known way, a public key from an identity. Similarly, in secret-key cryptography, ID-based systems allow authorized entities to derive a secret key from an identity. So, large databases maintaining the correspondence between an identity and the corresponding secret key are no longer required, resulting in better performances and higher security.