ID-based cryptography using symmetric primitives (Q2384045): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-007-9095-0 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2167460537 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536259 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3851217 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A non-interactive public-key distribution system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure communications over insecure channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4412971 / rank
 
Normal rank

Latest revision as of 17:31, 26 June 2024

scientific article
Language Label Description Also known as
English
ID-based cryptography using symmetric primitives
scientific article

    Statements

    ID-based cryptography using symmetric primitives (English)
    0 references
    0 references
    0 references
    0 references
    20 September 2007
    0 references
    The paper describes a general method for deriving an identity-based public key cryptosystem from a one-way function. ID-based signature schemes as well as ID-based encryption schemes are constructed. A general technique is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher. The approach makes use of one-way functions and block designs with properties related to cover-free families to optimize the efficiency of the schemes.
    0 references
    0 references
    0 references
    one-time signature
    0 references
    cover-free family
    0 references
    0 references