A novel way of issuing multiple private keys in ID-based Cryptosystems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Donghyun | - |
dc.contributor.author | Kim, Sangjin | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-23T20:44:12Z | - |
dc.date.available | 2021-06-23T20:44:12Z | - |
dc.date.issued | 2007-11 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/44370 | - |
dc.description.abstract | In this paper, we propose a new efficient model for issuing multiple private keys in IBC (Identity-Based Cryptosystem). In our model, the private key of a user is divided into two components: LTK (Long-Term Key) and STK (Short-Term Key). Both are issued separately by different parties. The LTK is issued in a threshold manner by KPAs (Key Privacy Agency). In contrast, the STK is issued by a single authority called KGC (Key Generation Center). A user can efficiently obtain a new private key containing the same identity information by contacting only the KGC and obtaining a new STK. We also give a security proof of the key issuing model and present a new IBE (Identity-Based Encryption) scheme based on our key issuing model. © 2007 IEEE. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE | - |
dc.title | A novel way of issuing multiple private keys in ID-based Cryptosystems | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ICCIT.2007.4420281 | - |
dc.identifier.scopusid | 2-s2.0-49049101297 | - |
dc.identifier.bibliographicCitation | 2007 International Conference on Convergence Information Technology, ICCIT 2007, pp 323 - 330 | - |
dc.citation.title | 2007 International Conference on Convergence Information Technology, ICCIT 2007 | - |
dc.citation.startPage | 323 | - |
dc.citation.endPage | 330 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | ID-based cryptosystems | - |
dc.subject.keywordPlus | Identity information | - |
dc.subject.keywordPlus | Identity-based cryptosystem | - |
dc.subject.keywordPlus | Identity-based encryption | - |
dc.subject.keywordPlus | International conferences | - |
dc.subject.keywordPlus | Key generation center | - |
dc.subject.keywordPlus | Key privacy | - |
dc.subject.keywordPlus | Private keys | - |
dc.subject.keywordPlus | Security proofs | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Information technology | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Technology | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/4420281 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.