It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem. The security of the scheme is equivalent to factoring the product of two large primes or solving the discrete logarithm problem. It enciphers data using the receiver's ID directly without the help of a third party.
|頁（從 - 到）||142-144|
|期刊||University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU|
|出版狀態||Published - 1992 三月 1|
|事件||Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan|
持續時間: 1991 十月 1 → 1991 十月 3
All Science Journal Classification (ASJC) codes