• DocumentCode
    923736
  • Title

    ID-based cryptographic schemes for user identification, digital signature, and key distribution

  • Author

    Harn, Lein ; Yang, Shoubao

  • Author_Institution
    Missouri-Kansas City Univ., MO, USA
  • Volume
    11
  • Issue
    5
  • fYear
    1993
  • fDate
    6/1/1993 12:00:00 AM
  • Firstpage
    757
  • Lastpage
    760
  • Abstract
    In 1984, A. Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he or she only needs to know the identity of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity-based cryptosystem, but only in constructing an identity-based signature scheme. The authors here propose three identity-based cryptographic schemes based on the discrete logarithm problem: the user identification scheme, the digital signature scheme, and the key distribution scheme. The schemes are based on the digital signature scheme of G.B. Agnew et al. (1990), which is reviewed
  • Keywords
    cryptography; ID cryptosystem; communication network; digital signature; discrete logarithm problem; key distribution; secret key; user identification; Authentication; Certification; Cities and towns; Communication networks; Computer science; Digital signatures; Identity-based encryption; Joining IEEE; Public key; Public key cryptography;
  • fLanguage
    English
  • Journal_Title
    Selected Areas in Communications, IEEE Journal on
  • Publisher
    ieee
  • ISSN
    0733-8716
  • Type

    jour

  • DOI
    10.1109/49.223877
  • Filename
    223877