Public-key ID-based cryptosystem

Hung Min Sun, Tzonelih Hwang

研究成果: Conference article同行評審


It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem. The security of the scheme is equivalent to factoring the product of two large primes or solving the discrete logarithm problem. It enciphers data using the receiver's ID directly without the help of a third party.

頁(從 - 到)142-144
期刊University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU
出版狀態Published - 1992 3月 1
事件Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan
持續時間: 1991 10月 11991 10月 3

All Science Journal Classification (ASJC) codes

  • 工程 (全部)


深入研究「Public-key ID-based cryptosystem」主題。共同形成了獨特的指紋。