Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A New ID-Based Key Sharing System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
ISW '99 Proceedings of the Second International Workshop on Information Security
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
Journal of Network and Computer Applications
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Authorisation infrastructure for on-demand network resource provisioning
GRID '08 Proceedings of the 2008 9th IEEE/ACM International Conference on Grid Computing
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
An IBE scheme using ECC combined public key
Computers and Electrical Engineering
Identity based conference key distribution scheme from parings
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Hi-index | 0.00 |
At the Crypto" 84, Shamir has presented a new concept of the identity-based cryptosystem, but no idea is presented on the realization scheme. In this paper a new realization scheme of the modified identity-based cryptosystem has been proposed. The basic idea of the scheme is based on the discrete logarithm problem and the difficulty of factoring a large integer composed of two large primes. The scheme seems to be very secure if all members of the system keep their secret keys safe, but if a constant number of users conspire, the center secret will be disclosed. Then it has a close relation to the well-known "threshold scheme". To cope with the conspiracy, the basic system is extended to get a new scheme of which "threshold" becomes higher. Detail considerations on the scheme are also given.