Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Communications of the ACM
PKI: It's Not Dead, Just Resting
Computer
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Secure distributed key generation for discrete-log based cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Distributed private-key generators for identity-based cryptography
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach
The Journal of Supercomputing
Hi-index | 0.00 |
Secure key issuing in identity-based cryptosystems is a challenging task due to the inherent drawback of key escrow. Several protocols have been proposed for key issuing which do not require secure channel and eliminate key escrow problem. However, the existing secure and efficient protocol requires all the participating authorities to be mandatorily available for constructing the user's private key. We present a secure and robust protocol for key issuing in identity-based cryptosystems by using the concept of threshold cryptosystems, which avoids the practical limitation.