ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution

نویسندگان

  • Lein Harn
  • Shoubao Yang
چکیده

AbstrucfIn 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identitybased cryptosystem, but only in constructing an identity-based signature scheme. In this paper, we propose three identity-based cryptographic schemes based on the discrete logarithm problem: the user identification scheme, the digital signature scheme, and the key distribution scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient ID-Based Signature Scheme using Pairings

An ID-based cryptographic scheme enables the user to public keys without exchanging public key certificates. In these schemes, users can generate their public and private keys using their identity. The positive application of bilinear pairings over elliptic curves makes the system easy and efficient in providing security. In this paper, we propose an ID-based signature scheme using bilinear pai...

متن کامل

Identification, Signature and Signcryption Using High Order Residues Modulo an RSA

Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature followed by encryption method. The concept of signcryption, together with an implementation based on the discrete logarithm problem, was proposed in 1996. In this work, we demonstrate how...

متن کامل

Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite

Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature followed by encryption method. The concept of signcryption, together with an implementation based on the discrete logarithm problem, was proposed in 1996. In this work, we demonstrate how...

متن کامل

Research Reports on Mathematical and Computing Sciences Department of Mathematical and Computing

The cryptographic protocol known as the combined scheme allows users to decrypt ciphertexts and create signatures using the same key. In this paper, we model ID-based combined schemes. Many ID-based encryption schemes and ID-based signature schemes are proposed. Most of them are based on bilinear maps. Although it seems possible to combine these schemes, there is no security definition for the ...

متن کامل

A Survey on ID-Based Cryptographic Primitives

ID-based cryptosystem has been, for a few years, the most active area of research and currently is of great interest to the cryptographic society. In this work we survey three fundamental ID-based cryptographic primitives Digital Signature, Encryption and Key Agreement, which are based on the mathematical concepts Integer Factorization, Quadratic Residues and Bilinear Pairings. We review severa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Journal on Selected Areas in Communications

دوره 11  شماره 

صفحات  -

تاریخ انتشار 1993