Constructing identity-based cryptosystems for discrete logarithm based cryptosystems |
| |
Authors: | Wei-Bin Lee Kuan-Chieh Liao |
| |
Affiliation: | Department of Information Engineering, Feng Chia University, 100 Wenhwa Road, Seatwen Taichung 407, Taiwan, ROC |
| |
Abstract: | In 1984, Shamir proposed the concept of the Identity-Based (ID-Based) cryptosystem. Instead of generating and publishing a public key for each user, the ID-Based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public-key file is not required. Since new cryptographic schemes always face security challenges and many discrete logarithm-based cryptographic systems have been deployed, therefore, the purpose of this paper is to design a transformation process that can transfer all of the discrete logarithm based cryptosystems into the ID-based systems rather than re-invent a new system. In addition, no modification of the original discrete logarithm based cryptosystems is necessary. |
| |
Keywords: | Public-key cryptosystem Discrete logarithm Identity-based cryptosystem Digital signature Key distribution |
本文献已被 ScienceDirect 等数据库收录! |
|