基于身份的密码系统(Identity-based Cryptosystem)是为了简化基于证书的密码系统繁琐的密钥管理过程而提出的。 短句来源 In …dict.cnki.net|基于2个网页 2. 以身分基底密码系统 ...P无代理伺服器等中继角色协助的网路架构特性,本论文以身分基底密码系统(identity-based cryptosystem)与椭圆曲线双线性 …pc01.lib....
Identity-Based Cryptosystem Secure E-mail SystemIdentity-Based CryptosystemHIBEGDH group signaturesecure E-mailTo solve the key distribution problems in the IBC scheme, this paper proposes a new key distribution protocol based on HIBE key distribution protocol and part of keys manage, which improves ...
AnIdentity-basedcryptosystemisanoveltypeofcryptographicschemeproposedby Shamir[2],whichenablesanypairofuserstocommunicatesecurely,andtoverifyeachother’s signatureswithoutexchangingpublicorprivatekeys,withoutkeepinganykeydirectoriesand withoutusingtheservicesofanythirdparty.ProblemswiththetraditionalPublickey ...
identity-based cryptosystemPKG forward secrecy PKG-FSFor an identity-based authenticated key agreement ID-AK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously established session keys after the master secret key of the Private Key ...
However, IBPRE schemes in [13] are generic constructions relying on CCA-secure 2-level hierarchical ID-based (2,2) threshold cryptosystem, they are inefficient. IBPRE schemes in [14] rely on conditional proxy broadcast re-encryption, they are also inefficient and can only achieve security ...
Chung YF, Huang KH, Lai F, Chen TS (2007) ID-based digital signature scheme on the elliptic curve cryptosystem. Comput Stand Interfaces 29(6):601–604 Article Google Scholar Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: IMA International Conference on ...
In an identity-based cryptosystem, a private key generator (PKG) uses a master secret key to issue private keys to users based on their identities. In this paper, we propose a new identity-based parallel key-insulated encryption (IBPKIE) scheme which achieves IND-ID-KI-CCA2 security without...
An identity-based encryption (IBE) scheme (see alsoidentity-based cryptography) is apublic keyencryption scheme in which the public key can be an arbitrary string. For example, if Alice wants to send a message to Bob at bob@yahoo.com, she simply encrypts the message using the string “bob...
Key update a b s t r a c t Key revocation is critical for the practicality of any public key cryptosystem and identity- based encryption (IBE)system.When a user’s private key is compromised,it is important for him/her to revoke his/her key.Up to now,little work has been published ...
In broadcast encryption schemes, a broadcaster encrypts messages and transmits them to some subset S of users who are listening to a broadcast channel. Any user in S can use his private key to decrypt the broadcast. An identity based cryptosystem is a public key cryptosystem where the public...