ID-based cryptographic schemes using a non-interactive public-key distribution system

Yuh Min Tseng, Jinn Ke Jan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Abstract

Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir's sense because each user's public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi's scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus.

Original languageEnglish
Title of host publicationProceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998
PublisherAssociation for Computing Machinery
Pages237-243
Number of pages7
ISBN (Electronic)0818687894, 9780818687891
DOIs
Publication statusPublished - 1998 Jan 1
Event14th Annual Computer Security Applications Conference, ACSAC 1998 - Phoenix, United States
Duration: 1998 Dec 71998 Dec 11

Other

Other14th Annual Computer Security Applications Conference, ACSAC 1998
CountryUnited States
CityPhoenix
Period98-12-0798-12-11

Fingerprint

Hash functions
Cryptography
Composite materials

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Cite this

Tseng, Y. M., & Jan, J. K. (1998). ID-based cryptographic schemes using a non-interactive public-key distribution system. In Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998 (pp. 237-243). Association for Computing Machinery. https://doi.org/10.1109/CSAC.1998.738643
Tseng, Yuh Min ; Jan, Jinn Ke. / ID-based cryptographic schemes using a non-interactive public-key distribution system. Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, 1998. pp. 237-243
@inproceedings{f792927e7cbb47ba9b68b6c0958923f1,
title = "ID-based cryptographic schemes using a non-interactive public-key distribution system",
abstract = "Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir's sense because each user's public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi's scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus.",
author = "Tseng, {Yuh Min} and Jan, {Jinn Ke}",
year = "1998",
month = "1",
day = "1",
doi = "10.1109/CSAC.1998.738643",
language = "English",
pages = "237--243",
booktitle = "Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998",
publisher = "Association for Computing Machinery",

}

Tseng, YM & Jan, JK 1998, ID-based cryptographic schemes using a non-interactive public-key distribution system. in Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, pp. 237-243, 14th Annual Computer Security Applications Conference, ACSAC 1998, Phoenix, United States, 98-12-07. https://doi.org/10.1109/CSAC.1998.738643

ID-based cryptographic schemes using a non-interactive public-key distribution system. / Tseng, Yuh Min; Jan, Jinn Ke.

Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, 1998. p. 237-243.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - ID-based cryptographic schemes using a non-interactive public-key distribution system

AU - Tseng, Yuh Min

AU - Jan, Jinn Ke

PY - 1998/1/1

Y1 - 1998/1/1

N2 - Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir's sense because each user's public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi's scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus.

AB - Shamir (1984) proposed the idea of a cryptographic system based on identification information and presented an identity-based signature scheme. He also presented as an open problem to find an ID-based public-key cryptosystem or public-key distribution system. In the past, many ID-based public-key distribution systems have been proposed. However, none of these is an ID-based system in Shamir's sense because each user's public key is not only the identity of the entity but also some additional random numbers. Maurer and Yacobi (1991) developed a non-interactive ID-based public-key distribution system. In their scheme, except for the identity of the entity, there were no public keys, certificates for public keys or other information required to be exchanged. However, they did not construct an ID-based signature scheme, user identification scheme or conference key distribution system. In this paper, we provide a slight improvement of the Maurer and Yacobi's scheme in that the trusted authority only adds one public value over the original scheme. Based on this, we provide not only a non-interactive public-key distribution system, but also a directed signature scheme, a user identification scheme and a conference key distribution system. Thus, a non-interactive public-key system will be more practical and complete for various kinds of applications. The security for the proposed schemes is based on the one-way hash function assumption and the difficulty of computing the discrete logarithm for a composite modulus.

UR - http://www.scopus.com/inward/record.url?scp=3042551124&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=3042551124&partnerID=8YFLogxK

U2 - 10.1109/CSAC.1998.738643

DO - 10.1109/CSAC.1998.738643

M3 - Conference contribution

AN - SCOPUS:3042551124

SP - 237

EP - 243

BT - Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998

PB - Association for Computing Machinery

ER -

Tseng YM, Jan JK. ID-based cryptographic schemes using a non-interactive public-key distribution system. In Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery. 1998. p. 237-243 https://doi.org/10.1109/CSAC.1998.738643