메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 674-678

An efficient secure key issuing protocol in ID-based cryptosystems

Author keywords

Bilinear pairings; ID based cryptosystems; Key escrow; Key issuing; Secure channel

Indexed keywords

NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 24744468599     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.75     Document Type: Conference Paper
Times cited : (29)

References (16)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag LNCS 196
    • A.Shamir, "Identity-based Cryptosystems and Signature Schemes", In Advances in Cryptology - CRYPTO'84, Springer-Verlag LNCS 196, 1985, pp. 47-53.
    • (1985) Advances in Cryptology - CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84947558992 scopus 로고
    • A paradoxical identity-based signature scheme resulting from zero-knowledge
    • Springer, LNCS 403
    • L. Guillou, J. J. Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting From Zero-Knowledge", Advances in Cryptology - Crypto'88, Springer, LNCS 403, 1988, pp. 216-231.
    • (1988) Advances in Cryptology - Crypto'88 , pp. 216-231
    • Guillou, L.1    Quisquater, J.J.2
  • 4
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer, LNCS 263
    • A. Fiat, A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems", Advances in Cryptology - Crypto'86, Springer, LNCS 263, 1986, pp. 186-194.
    • (1986) Advances in Cryptology - Crypto'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • J. Kilian, editor, Springer-Verlag, LNCS 2139
    • D. Boneh, M. Franklin. "Identity-based Encryption from the Weil pairing", In J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, Springer-Verlag, LNCS 2139, 2001, pp. 213-229.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84944050090 scopus 로고    scopus 로고
    • Applications of multiple trust authorities in pairing based cryptosystems
    • LNCS 2437, Springer-Verlag
    • L. Chen, K. Harrison, N. P. Smart and D. Soldera, "Applications of Multiple Trust Authorities in pairing based Cryptosystems", InfraSec 2002, LNCS 2437, Springer-Verlag, 2002, pp. 260-275.
    • (2002) InfraSec 2002 , pp. 260-275
    • Chen, L.1    Harrison, K.2    Smart, N.P.3    Soldera, D.4
  • 7
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from pairings: A snap shot of current research
    • K. Paterson, "Cryptography from Pairings: a snap shot of current research", Information Security Technical Report, Vol. 7(3), 2002, pp. 41-54.
    • (2002) Information Security Technical Report , vol.7 , Issue.3 , pp. 41-54
    • Paterson, K.1
  • 8
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Springer- Verlag, LNCS 2595
    • F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings", Selected Areas in Cryptography-SAC 2002, Springer- Verlag, LNCS 2595, 2003, pp. 310-324.
    • (2003) Selected Areas in Cryptography-SAC 2002 , pp. 310-324
    • Hess, F.1
  • 10
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Springer- Verlag, LNCS 547
    • C. Gentry, "Certificate-Based Encryption and the Certificate Revocation Problem", Advances in Cryptology- Eurocrypt'03, Springer- Verlag, LNCS 547, 2003, pp. 272-293.
    • (2003) Advances in Cryptology- Eurocrypt'03 , pp. 272-293
    • Gentry, C.1
  • 11
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret", Comm. ACM, 1979, Volume 22(11), pp. 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 35048847949 scopus 로고    scopus 로고
    • What is possible with identity based cryptography for PKIs and what still must be improved
    • LNCS 3093
    • B. Libert, J. J. Quisquarter, "What Is Possible with Identity based Cryptography for PKIs and What Still Must be Improved", EuroPKI2004, LNCS 3093, 2004, pp. 57-70.
    • (2004) EuroPKI2004 , pp. 57-70
    • Libert, B.1    Quisquarter, J.J.2
  • 14
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Advances in Cryptology - Eurocrypt'91, Springer-Verlag
    • M. Girault, "Self-certified public keys", Advances in Cryptology - Eurocrypt'91, Springer-Verlag, LNCS 2556, 1991, pp. 490-497.
    • (1991) LNCS , vol.2556 , pp. 490-497
    • Girault, M.1
  • 15
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Springer-Verlag, LNCS 2248
    • D. Boneh, B. Lynn, H. Shacham, "Short signatures from the Weil pairing", Asiacrypt 2001, Springer-Verlag, LNCS 2248, 2002, pp. 514-532.
    • (2002) Asiacrypt 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 16
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Springer-Verlag, LNCS 2442
    • P. Barreto, H. Kim, B. Lynn, M. Scott, "Efficient algorithms for pairing-based Cryptosystems", Advances in Cryptology -Crypto'2002, Springer-Verlag, LNCS 2442, pp. 354-368.
    • Advances in Cryptology -Crypto'2002 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.