Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Computation of discrete logarithms in prime fields
Designs, Codes and Cryptography
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
A Realization Scheme for the Identity-Based Cryptosystem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Modified Maurer-Yacobi`s scheme and its applications
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
ID-based cryptography using symmetric primitives
Designs, Codes and Cryptography
Designs, Codes and Cryptography
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
Hi-index | 0.01 |
In 1984, Shamir proposed the concept of the Identity-Based (ID-Based) cryptosystem. Instead of generating and publishing a public key for each user, the ID--Based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public-key file is not required. Since new cryptographic schemes always face security challenges and many discrete logarithm-based cryptographic systems have been deployed, therefore, the purpose of this paper is to design a transformation process that can transfer all of the discrete logarithm based cryptosystems into the ID-based systems rather than re-invent a new system. In addition, no modification of the original discrete logarithm based cryptosystems is necessary.