Public-key ID-based cryptosystem

Hung Min Sun, Tzonelih Hwang

Research output: Contribution to journalConference articlepeer-review

Abstract

It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem. The security of the scheme is equivalent to factoring the product of two large primes or solving the discrete logarithm problem. It enciphers data using the receiver's ID directly without the help of a third party.

Original languageEnglish
Pages (from-to)142-144
Number of pages3
JournalUniversity of Kentucky, Office of Engineering Services, (Bulletin) UKY BU
Publication statusPublished - 1992 Mar 1
EventProceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan
Duration: 1991 Oct 11991 Oct 3

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Public-key ID-based cryptosystem'. Together they form a unique fingerprint.

Cite this