ID-based cryptography using symmetric primitives (Q2384045): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(5 intermediate revisions by 4 users not shown) | |||
Property / author | |||
Property / author: Q1055417 / rank | |||
Property / author | |||
Property / author: Peter R. Wild / rank | |||
Property / author | |||
Property / author: Fred C. Piper / rank | |||
Normal rank | |||
Property / author | |||
Property / author: Peter R. Wild / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s10623-007-9095-0 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2167460537 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536259 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4783728 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New directions in cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3851217 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A non-interactive public-key distribution system / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4718481 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Secure communications over insecure channels / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4412971 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 17:31, 26 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | ID-based cryptography using symmetric primitives |
scientific article |
Statements
ID-based cryptography using symmetric primitives (English)
0 references
20 September 2007
0 references
The paper describes a general method for deriving an identity-based public key cryptosystem from a one-way function. ID-based signature schemes as well as ID-based encryption schemes are constructed. A general technique is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher. The approach makes use of one-way functions and block designs with properties related to cover-free families to optimize the efficiency of the schemes.
0 references
one-time signature
0 references
cover-free family
0 references