Abstract
Non-interactive ID-based key sharing schemes are convenient in practice since they do not need preliminary communication. However, they are vulnerable to entities conspiracy. This paper proposes a new ID-based non-interactive key sharing scheme with high security against conspiracy of entities.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Blom “Non-public key distribution,” Proceeding of Crypto’82, pp.231–236, 1982.
A. Shamir “Identity-based cryptosystem and signature scheme,” Proceeding of Crypto’84, pp.47–53, 1984.
E. Okamoto, K. Tanaka “Key distribution system based on identification information,” IEEE Journal on Selected Areas in Communications, Vol.7, No.4, pp.481–485, May, 1989.
T. Matsumoto, H. Imai “On the key predistribution system: A practical solution to the key distribution problem,” Proceeding of Crypto’87, pp.185–193, 1987.
H. Tanaka, “A realization scheme for the identity-based cryptosystem,” Proceeding of Crypto’87, pp.340–349, 1987.
S. Tsujii, T. Itoh, “ID-based cryptosystem based on the discrete logarithm problem,” IEEE Journal on Selected Areas in Communications, Vol.7, No.4, pp.467–473, May, 1989.
S. Tsujii, T. Itoh, “ID-based cryptosystem using discrete logarithm problem,” Electronics Letters, Vol.23, No.24, pp.1318–1320, Nov. 1987. May, 1989.
Harada, Matsuzaki “An ID-based key sharing scheme without preliminary communication,” IEICE Japan Tech. Rep. ISEC89-38, Dec. 1989
H. Tanaka “Identity-based non-interactive common-information generation and its application to cryptosystems,” Proceeding of Symposium on Cryptography and Information Security, SCIS91, Japan, Dec. 1990.
Y. Murakami, S. Kasahara “An ID-based key distribution system,” IEICE Japan Tech. Rep. ISEC90-26, Sept. 1990.
Y. Murakami, S. Kasahara “The discrete Logarithm problem under a composite modulus,” IEICE Japan Tech. Rep. ISEC90-42, Dec. 1990.
U. M. Maurer, Y. Yacobi “Non-interactive public key cryptography,” Proceeding of EUROCRYPT’91, 1991.
T. Matsumoto, H. Imai “On the security of some key sharing schemes (Part 2)” IEICE Japan Tech. Rep. ISEC90-28, 1990.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsujii, S., Chao, J. (1992). A New ID-Based Key Sharing System. In: Feigenbaum, J. (eds) Advances in Cryptology — CRYPTO ’91. CRYPTO 1991. Lecture Notes in Computer Science, vol 576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46766-1_23
Download citation
DOI: https://doi.org/10.1007/3-540-46766-1_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-55188-1
Online ISBN: 978-3-540-46766-3
eBook Packages: Springer Book Archive