Identity‐based noninteractive common‐key generation and its application to cryptosystems
作者:
Hatsukazu Tanaka,
期刊:
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
(WILEY Available online 1993)
卷期:
Volume 76,
issue 1
页码: 1-7
ISSN:1042-0967
年代: 1993
DOI:10.1002/ecjc.4430760101
出版商: Wiley Subscription Services, Inc., A Wiley Company
关键词: ID‐based cryptosystems;common‐key generation;RSA public‐key cryptosystem;conspiracy
数据来源: WILEY
摘要:
AbstractAt Crypto '84, Shamir originally proposed the concept of identity (ID)‐based cryptosystems and signature schemes. In this paper, a new realization scheme of a cryptosystem based on this concept is proposed for which the common‐key generation based on ID‐information requires neither a public directory nor interactive preparation for communication.For the principal operations of common‐key generation it is necessary to compute powers of integers modulo the product of two large Sophie Germain (SG) primes. The basis for security, as in the RSA cryptosystem, depends on the computational difficulty of factoring this product into its constituent primes. In particular, as a realization of a cryptosystem of the new ID‐based type, we permit the generation of nonsymmetric common keys and generate two different common keys for each pair of users. One key is used for enciphering and the other is used for deciphering when they are applied to a common‐key cryptosystem. The result is a very secure realization of an ID‐based cryptosystem which prevents both the disclosure of the center's secrets and a conspiracy by nonparticipants to forge a secret key between users since the exponent is nonsymmetric in the step before executing the exponentiation and it is a proper value betw
点击下载:
PDF
(455KB)
返 回