Paterson, K.G., Price, G.: A comparison between traditional pub- lic key infrastructures and identity-based cryptography. Inf. Secur. Tech. Report 8(3), 57-72 (2003)Kenneth G. Paterson and Geraint Price (2003),
CryptographySecurityMobileCallsGSMUMTSIdentiy-BasedSmartphonesIn this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security over...
Public key cryptographySMSSecure data communicationMobile telecommunicationElliptic curve cryptographyTo exploit the popularity of SMS as a secure business bearer protocol and offer the security services such as confidentiality, integrity, authentication and non-repudiation. In this study, we propose a ...
IBE. In 1984, Shamir [2] introduced the concept of identity-based cryptography to ease the certificate management in traditional public key system. A user’s public key in an IBE scheme which the identity information of the user (e.g., email address). Hence the public key is implicitly au...
An identity-based encryption (IBE) scheme (see alsoidentity-based cryptography) is apublic keyencryption scheme in which the public key can be an arbitrary string. For example, if Alice wants to send a message to Bob at bob@yahoo.com, she simply encrypts the message using the string “bob...
aThis limits the utility of identity-based cryptography as a transitional step to full-blown public key cryptography. Furthermore, it is fundamentally difficult to reconcile finegrained revocation with identity-based cryptography. 这限制基于身分的密码学的公共事业作为过渡步到盛放的公共密钥加密法。
This area of contemporary cryptography is usually referred to as leakage-resilient cryptography and it has been an increasingly active arena in recent years. Current security models assume an upper bound on the type or amount of information about the secret key that an adversary might learn from ...
model. Using standard techniques from threshold cryptography [20, 22] the PKG in our scheme can be distributed so that the master-key is never available in a single location. Unlike common threshold systems, we show that robustness for our distributed PKG is free. Our IBE system can be built...
to the use of public-key cryptography. The traditional approach for doing this is to use the public key infrastructures, in which a certification authority (CA) issues a certificate which binds a user's identity with his/her public key. With ID-based cryptosystems, this binding is not necessa...
Li et al. [9] proposed a DA protocol using certificate authority-based public key cryptography (CA-PKC) that utilizes a public key infrastructure (PKI) to issue, store, deliver, and revoke the public key certificates of the users. The protocol was originally proposed to implement a secure ...