Abstract
An efficient ID-based key distribution scheme with sender authentication is proposed. The security of the scheme is based on the tamperfreeness of a device as well as the security of the underlying private-key cryptosystems. Each user's tamperfree device contains distinct supersecret keys.
Original language | English |
---|---|
Pages (from-to) | 31-34 |
Number of pages | 4 |
Journal | Information Processing Letters |
Volume | 44 |
Issue number | 1 |
DOIs | |
Publication status | Published - 1992 Nov 9 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications