A new scheme for id-based cryptosystems and signatures

Chi Sung Laih, Jau Yien Lee, Chin-Hsing Chen, Lein Harn

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystems and signatures. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This eliminates the need of a large public-file and the exchange of private or public keys. The major advantage of the ID-based cryptosystems is that the number of users can be exteneded to t+L users without decreasing the system security when users conspire, where L is the number of the system’s secrets and t is the number of factors in p - 1.

Original languageEnglish
Pages (from-to)605-610
Number of pages6
JournalJournal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an
Volume15
Issue number5
DOIs
Publication statusPublished - 1992 Jan 1

Fingerprint

Cryptography
Security systems

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

@article{b6f393a4959b475d89cd8921864f03aa,
title = "A new scheme for id-based cryptosystems and signatures",
abstract = "This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystems and signatures. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This eliminates the need of a large public-file and the exchange of private or public keys. The major advantage of the ID-based cryptosystems is that the number of users can be exteneded to t+L users without decreasing the system security when users conspire, where L is the number of the system’s secrets and t is the number of factors in p - 1.",
author = "Laih, {Chi Sung} and Lee, {Jau Yien} and Chin-Hsing Chen and Lein Harn",
year = "1992",
month = "1",
day = "1",
doi = "10.1080/02533839.1992.9677452",
language = "English",
volume = "15",
pages = "605--610",
journal = "Chung-kuo Kung Ch'eng Hsueh K'an/Journal of the Chinese Institute of Engineers",
issn = "0253-3839",
publisher = "Chinese Institute of Engineers",
number = "5",

}

A new scheme for id-based cryptosystems and signatures. / Laih, Chi Sung; Lee, Jau Yien; Chen, Chin-Hsing; Harn, Lein.

In: Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an, Vol. 15, No. 5, 01.01.1992, p. 605-610.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A new scheme for id-based cryptosystems and signatures

AU - Laih, Chi Sung

AU - Lee, Jau Yien

AU - Chen, Chin-Hsing

AU - Harn, Lein

PY - 1992/1/1

Y1 - 1992/1/1

N2 - This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystems and signatures. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This eliminates the need of a large public-file and the exchange of private or public keys. The major advantage of the ID-based cryptosystems is that the number of users can be exteneded to t+L users without decreasing the system security when users conspire, where L is the number of the system’s secrets and t is the number of factors in p - 1.

AB - This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystems and signatures. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This eliminates the need of a large public-file and the exchange of private or public keys. The major advantage of the ID-based cryptosystems is that the number of users can be exteneded to t+L users without decreasing the system security when users conspire, where L is the number of the system’s secrets and t is the number of factors in p - 1.

UR - http://www.scopus.com/inward/record.url?scp=41849129482&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=41849129482&partnerID=8YFLogxK

U2 - 10.1080/02533839.1992.9677452

DO - 10.1080/02533839.1992.9677452

M3 - Article

VL - 15

SP - 605

EP - 610

JO - Chung-kuo Kung Ch'eng Hsueh K'an/Journal of the Chinese Institute of Engineers

JF - Chung-kuo Kung Ch'eng Hsueh K'an/Journal of the Chinese Institute of Engineers

SN - 0253-3839

IS - 5

ER -