National Changhua University of Education Institutional Repository : Item 987654321/12185
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 6469/11641
造访人次 : 18461350      在线人数 : 249
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 进阶搜寻

jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/12185

题名: ID-Based Cryptographic Schemes Using a Non-Interactive Public-key Distribution System
作者: Tseng, Yuh-Min;Jan, Jinn-Ke
贡献者: 數學系
日期: 1998-12
上传时间: 2012-07-03T03:46:18Z
出版者: IEEE
摘要: Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir's sense because each user's public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi's scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus
關聯: The 14th Annual Computer Security Applications Conference (ACSAC 1998), Scottsdale, AZ, USA, IEEE Computer Society, : 237-243
显示于类别:[數學系] 會議論文

文件中的档案:

档案 大小格式浏览次数
index.html0KbHTML481检视/开启


在NCUEIR中所有的数据项都受到原著作权保护.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈