A Practical Key Issuing Scheme in Identity-based Cryptosystem

被引:0
|
作者
Wang, Changji [1 ]
Liu, Jing [1 ]
机构
[1] Sun Yat Sen Univ, Minist Educ, Key Lab Digital Life,Dept Comp Sci, Guangdong Prov Informat Secur Key Lab, Guangzhou 510275, Guangdong, Peoples R China
关键词
D O I
10.1109/CCCM.2008.302
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure key issuing in identity-based public key cryptosystems is a challenging task due to the inherent drawback of key escrow and the requirement for secure channel between the private key generator (PKG) and users. In this paper we propose a practical key issuing scheme. User registers at a local registration authority in off-line manner local registration authority signs and delivers authenticated user's information to multiple PKGs in batch manner The master key is generated by PKGs based on secure distributed key generation protocol, which solves the key escrow problem. The secure channel between the user and the PKGs are not needed by using blinding technique. The proposed scheme is more efficient than those of existing key issuing schemes and the security is proved under random oracle model.
引用
收藏
页码:454 / 457
页数:4
相关论文
共 50 条
  • [1] A novel identity-based key issuing scheme based on interacting neural network
    Chen, TM
    Chen, B
    Cai, JM
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 2, PROCEEDINGS, 2005, 3497 : 637 - 642
  • [2] A REALIZATION SCHEME FOR THE IDENTITY-BASED CRYPTOSYSTEM
    TANAKA, H
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 340 - 349
  • [3] An Improvement of an Identity-Based Key Issuing Protocol
    Shi, Weimin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4518 - 4521
  • [4] Separable and anonymous identity-based key issuing
    Sui, AF
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    Tsang, WW
    Chong, CF
    Pun, KH
    Chan, HW
    [J]. 11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 275 - 279
  • [5] An improvement of an identity-based key issuing protocol
    Cao, Feng
    Cao, Zhenfu
    Wang, Licheng
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 13 - +
  • [6] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [7] Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based Scheme
    Siad, Amar
    Amara, Moncef
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 35 - 40
  • [8] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 692 - 696
  • [9] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    [J]. International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [10] Identity-based key issuing protocol for ad hoc networks
    Ren, Yongjun
    Wang, Jiandong
    Zhang, Youdong
    Fang, Liming
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 917 - 921