Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
Multiparty authentication services and key agreement protocols with semi-trusted third party
Journal of Computer Science and Technology
Authenticated group key agreement with admission control
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Secure Mutual Authentication for Ad hoc Wireless Networks
The Journal of Supercomputing
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
An Identity-Based Key Agreement Protocol for the Network Layer
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Securing Mobile Phone Calls with Identity-Based Cryptography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Secure mobile communication via identity-based cryptography and server-aided computations
The Journal of Supercomputing
Identity-based key exchange protocols without pairings
Transactions on computational science X
Private discovery of common social contacts
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Cryptosystems based on elliptic curve pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
On forward secrecy in one-round key exchange
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Hi-index | 0.00 |
Two types of key distribution systems based on identification information are proposed, one for decentralized networks and the other for centralized networks. The system suitable for decentralized networks is analogous to the Diffie-Hellman public key distribution system, in which the former uses each user's identification information instead of a public file used in the latter. The proposed system is able to defend the networks from impostors. The system suitable for centralized networks, which is less analogous to the Diffie-Hellman system, can also defend the networks from impostors, though the network center does not have any directory of public or private key-encrypting keys of the users. Both of the systems proposed in this paper do not require any seivices of a center to distribute work keys, or users to keep directories of key-encrypting keys. Therefore, key management in cryptosystems can be practical and simplified by adopting the identity-based key distribution systems.