DocumentCode :
2461134
Title :
ID-based cryptographic schemes using a non-interactive public-key distribution system
Author :
Tseng, Yuh-Min ; Jan, Jinn-Ke
Author_Institution :
Inst. of Appl. Math., Nat. Chung-Hsing Univ., Taichung, Taiwan
fYear :
1998
fDate :
7-11 Dec 1998
Firstpage :
237
Lastpage :
243
Abstract :
Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir´s sense because each user´s public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi´s scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus
Keywords :
authorisation; public key cryptography; ID-based cryptographic schemes; certificates; composite modulus; conference key distribution system; directed signature scheme; discrete logarithm; identification information; identity-based signature scheme; noninteractive public-key distribution system; one-way hash function; public value; public-key cryptosystem; random numbers; trusted authority; user identification scheme; Authentication; Digital signatures; Identity-based encryption; Mathematics; Public key; Public key cryptography; Telecommunication computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1998. Proceedings. 14th Annual
Conference_Location :
Phoenix, AZ
ISSN :
1063-9527
Print_ISBN :
0-8186-8789-4
Type :
conf
DOI :
10.1109/CSAC.1998.738643
Filename :
738643
Link To Document :
بازگشت