Public-key ID-based cryptosystem

Hung Min Sun, Tzonelih Hwang

研究成果: Conference article同行評審

摘要

It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem. The security of the scheme is equivalent to factoring the product of two large primes or solving the discrete logarithm problem. It enciphers data using the receiver's ID directly without the help of a third party.

原文English
頁(從 - 到)142-144
頁數3
期刊University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU
出版狀態Published - 1992 三月 1
事件Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan
持續時間: 1991 十月 11991 十月 3

All Science Journal Classification (ASJC) codes

  • Engineering(all)

指紋 深入研究「Public-key ID-based cryptosystem」主題。共同形成了獨特的指紋。

引用此