This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystems and signatures. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This eliminates the need of a large public-file and the exchange of private or public keys. The major advantage of the ID-based cryptosystems is that the number of users can be exteneded to t+L users without decreasing the system security when users conspire, where L is the number of the system’s secrets and t is the number of factors in p - 1.
|Number of pages||6|
|Journal||Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an|
|Publication status||Published - 1992 Jan 1|
All Science Journal Classification (ASJC) codes