Abstract
A key distribution system is a system in which users securely generate a common key. One kind of identity-based key distribution system was proposed by E. Okamoto[1]. Its security depends on the difficulty of factoring a composite number of two large primes like RSA public-key cryptosystem. Another kind of identity-based key distribution system was proposed by K. Nyberg, R.A. Rueppel[7]. Its security depends on the difficulty of the discrete logarithm problem.
On the other hand, Koblitz and Miller described how a group of points on an elliptic curve over a finite field can be used to construct a public key cryptosystem.
In 1997, we proposed an ID-based key distribution system over an elliptic curve[14], as well as over a ring Z/nZ. Its security depends on the difficulty of factoring a composite number of two large primes. We showed that the system is more suitable for the implementation on an elliptic curve than on a ring Z/nZ[14].
In this paper, we apply the Nyberg-Rueppel ID-based key distribution system[7] to an elliptic curve. It provides relatively small block size and high security. This public key scheme can be efficiently implemented. However the scheme[7] requires relatively large data transmission. As a solution to this problem, we improve the scheme. The improved scheme is very efficient since the data transferred for generation of a common key is reduced to half of the previous one.
Preview
Unable to display preview. Download preview PDF.
References
E. Okamoto, “An Introduction to the Theory of Cryptography”, Kyoritsu Shuppan, 1993.
J.H. Silverman, J. Tate, “Rational Points on Elliptic Curves”, Springer-Verlag, 1994.
K. Koyama, U.M. Maurer, T. Okamoto and S. Vanstone, “New public-keyschemes based on elliptic curves over the ring Z n ”, Advances in Crypt ology-Proceedings of CRYPT'91, LNCS 576, pp.252–266, 1991.
H. Tanaka, “Identity-Based Non-Interactive Key Sharing Scheme and Its Application to Some Cryptographic Systems”, Proceedings of Symposium on Cryptography and Information Security, SCIS'94, 1994.
T. Matsumoto, H. Imai, “Key Predistribution System”, The transactions of the institute of electronics information and communication engineers, Vol.J71-A, No.11, pp2046–2053, 1988.
C.G. Günther, “An identity-based key-exchange protocol”, Advances in Cryptology-Proceedings of EUROCRYPT'89, LNCS 434, pp.29–37, 1990.
K. Nyberg, R.A. Rueppel, “A New Signature Scheme Based on the DSA Giving Message Recovery”, Proceedings of 1st ACM Conference on Computer and Communications Security, 1993.
A. Miyaji, “A message recovery signature scheme equivalent to DSA over elliptic curves”, Advances in Cryptology-Proceedings of ASIACRYPT'96, LNCS 1163, pp.1–14, 1996.
A. Menezes, T. Okamoto and S. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field”, Proceedings of 22st Annual ACM Symposium on the Theory of Computing, pp.80–89, 1991.
N. Koblitz, “A Course in number theory and cryptocraphy”, Springer-Verlag, 1987.
K. Nyberg, R.A. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem”, Advances in Cryptology-Proceedings of EUROCRYPT'94, LNCS 950, pp.182–193, 1995.
K. Nyberg, R.A. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem”, Designs Codes and Cryptography pp.61–81, 1996.
A. Miyaji, “Strengthened Message Recovery Signature Scheme”,, Proceedings of Symposium on Cryptography and Information Security, SCIS'96, 1996.
H. Sakazaki, E. Okamoto and M. Mambo, “ID-based Key Distribution System over Elliptic Curves”, Proceedings of Symposium on Cryptography and Information Security, SCIS'97, 1997.
Author information
Authors and Affiliations
Corresponding author
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sakazaki, H., Okamoto, E., Mambo, M. (1998). The application of ID-based key distribution systems to an elliptic curve. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030434
Download citation
DOI: https://doi.org/10.1007/BFb0030434
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64382-1
Online ISBN: 978-3-540-69767-1
eBook Packages: Springer Book Archive