An ID-based cryptosystem based on the discrete logarithm problem
In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key di...
Gespeichert in:
Veröffentlicht in: | IEEE journal on selected areas in communications 1989-05, Vol.7 (4), p.467-473 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 473 |
---|---|
container_issue | 4 |
container_start_page | 467 |
container_title | IEEE journal on selected areas in communications |
container_volume | 7 |
creator | Tsujii, S. Itoh, T. |
description | In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.< > |
doi_str_mv | 10.1109/49.17709 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_49_17709</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>17709</ieee_id><sourcerecordid>28418343</sourcerecordid><originalsourceid>FETCH-LOGICAL-c304t-7841445440f6ea062704728ca7ba7ab11bef1eeae91963cc0d40bdd0430bcedb3</originalsourceid><addsrcrecordid>eNpFkE1LAzEQhoMoWKvg1dteFC9bJ5t0k9yU-lUoeNFzSLKzdmU_apIe-u-N3UJPAzMPzzu8hFxTmFEK6oGrGRUC1AmZ0Plc5gAgT8kEBGO5FLQ8Jxch_ABQzmUxIY9PfbZ8zq0JWGXO7zZxCLsQscvG1dBncY1Z1QTnMWLWDt_GN3HdZRs_2Ba7S3JWmzbg1WFOydfry-fiPV99vC0XT6vcMeAxF5KnxDnnUJdooCwEcFFIZ4Q1wlhKLdYU0aCiqmTOQcXBVhVwBtZhZdmU3I3elPu7xRB1l37CtjU9DtugixQgGWcJvB9B54cQPNZ645vO-J2moP8r0lzpfUUJvT04TXCmrb3pXROOvBKySGDibkauQcTjee_4A82VbS0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>28418343</pqid></control><display><type>article</type><title>An ID-based cryptosystem based on the discrete logarithm problem</title><source>IEEE Electronic Library (IEL)</source><creator>Tsujii, S. ; Itoh, T.</creator><creatorcontrib>Tsujii, S. ; Itoh, T.</creatorcontrib><description>In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.< ></description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/49.17709</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Cryptography ; Data communication ; Data security ; Exact sciences and technology ; Identity-based encryption ; Information, signal and communications theory ; Large-scale systems ; Public key ; Public key cryptography ; Signal and communications theory ; Telecommunications and information theory</subject><ispartof>IEEE journal on selected areas in communications, 1989-05, Vol.7 (4), p.467-473</ispartof><rights>1991 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c304t-7841445440f6ea062704728ca7ba7ab11bef1eeae91963cc0d40bdd0430bcedb3</citedby><cites>FETCH-LOGICAL-c304t-7841445440f6ea062704728ca7ba7ab11bef1eeae91963cc0d40bdd0430bcedb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/17709$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/17709$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19782770$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Tsujii, S.</creatorcontrib><creatorcontrib>Itoh, T.</creatorcontrib><title>An ID-based cryptosystem based on the discrete logarithm problem</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.< ></description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Data communication</subject><subject>Data security</subject><subject>Exact sciences and technology</subject><subject>Identity-based encryption</subject><subject>Information, signal and communications theory</subject><subject>Large-scale systems</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1989</creationdate><recordtype>article</recordtype><recordid>eNpFkE1LAzEQhoMoWKvg1dteFC9bJ5t0k9yU-lUoeNFzSLKzdmU_apIe-u-N3UJPAzMPzzu8hFxTmFEK6oGrGRUC1AmZ0Plc5gAgT8kEBGO5FLQ8Jxch_ABQzmUxIY9PfbZ8zq0JWGXO7zZxCLsQscvG1dBncY1Z1QTnMWLWDt_GN3HdZRs_2Ba7S3JWmzbg1WFOydfry-fiPV99vC0XT6vcMeAxF5KnxDnnUJdooCwEcFFIZ4Q1wlhKLdYU0aCiqmTOQcXBVhVwBtZhZdmU3I3elPu7xRB1l37CtjU9DtugixQgGWcJvB9B54cQPNZ645vO-J2moP8r0lzpfUUJvT04TXCmrb3pXROOvBKySGDibkauQcTjee_4A82VbS0</recordid><startdate>19890501</startdate><enddate>19890501</enddate><creator>Tsujii, S.</creator><creator>Itoh, T.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>19890501</creationdate><title>An ID-based cryptosystem based on the discrete logarithm problem</title><author>Tsujii, S. ; Itoh, T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c304t-7841445440f6ea062704728ca7ba7ab11bef1eeae91963cc0d40bdd0430bcedb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1989</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Data communication</topic><topic>Data security</topic><topic>Exact sciences and technology</topic><topic>Identity-based encryption</topic><topic>Information, signal and communications theory</topic><topic>Large-scale systems</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tsujii, S.</creatorcontrib><creatorcontrib>Itoh, T.</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tsujii, S.</au><au>Itoh, T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An ID-based cryptosystem based on the discrete logarithm problem</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>1989-05-01</date><risdate>1989</risdate><volume>7</volume><issue>4</issue><spage>467</spage><epage>473</epage><pages>467-473</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.< ></abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/49.17709</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 1989-05, Vol.7 (4), p.467-473 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_crossref_primary_10_1109_49_17709 |
source | IEEE Electronic Library (IEL) |
subjects | Applied sciences Cryptography Data communication Data security Exact sciences and technology Identity-based encryption Information, signal and communications theory Large-scale systems Public key Public key cryptography Signal and communications theory Telecommunications and information theory |
title | An ID-based cryptosystem based on the discrete logarithm problem |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T03%3A41%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20ID-based%20cryptosystem%20based%20on%20the%20discrete%20logarithm%20problem&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Tsujii,%20S.&rft.date=1989-05-01&rft.volume=7&rft.issue=4&rft.spage=467&rft.epage=473&rft.pages=467-473&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/49.17709&rft_dat=%3Cproquest_RIE%3E28418343%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=28418343&rft_id=info:pmid/&rft_ieee_id=17709&rfr_iscdi=true |