A Practical Key Issuing Scheme in Identity-based Cryptosystem

被引:0
|
作者
Wang, Changji [1 ]
Liu, Jing [1 ]
机构
[1] Sun Yat Sen Univ, Minist Educ, Key Lab Digital Life,Dept Comp Sci, Guangdong Prov Informat Secur Key Lab, Guangzhou 510275, Guangdong, Peoples R China
关键词
D O I
10.1109/CCCM.2008.302
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure key issuing in identity-based public key cryptosystems is a challenging task due to the inherent drawback of key escrow and the requirement for secure channel between the private key generator (PKG) and users. In this paper we propose a practical key issuing scheme. User registers at a local registration authority in off-line manner local registration authority signs and delivers authenticated user's information to multiple PKGs in batch manner The master key is generated by PKGs based on secure distributed key generation protocol, which solves the key escrow problem. The secure channel between the user and the PKGs are not needed by using blinding technique. The proposed scheme is more efficient than those of existing key issuing schemes and the security is proved under random oracle model.
引用
下载
收藏
页码:454 / 457
页数:4
相关论文
共 50 条
  • [21] Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
    Sun, Ying
    Yu, Yong
    Mu, Yi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1690 - 1693
  • [22] Security of an identity-based cryptosystem and the related reductions
    Okamoto, T
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
  • [23] AN IDENTITY-BASED CRYPTOSYSTEM FOR ENCRYPTING LONG MESSAGES
    Liu, Jiqiang
    Zhong, Sheng
    Han, Lei
    Yao, Haifan
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3295 - 3301
  • [24] Broadcast encryption using identity-based cryptosystem
    Lv, Xixiang
    Yang, Bo
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 716 - 720
  • [25] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [26] An efficient identity-based secret key management scheme for MANETs
    Zhang, Yong
    Qian, Hai-Feng
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
  • [27] Identity-Based Chameleon Hash Scheme without Key Exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Tian, Haibo
    Li, Jin
    Kim, Kwangjo
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
  • [28] Identity-based non-interactive key sharing equivalent to RSA public-key cryptosystem
    Tanaka, H
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 384 - 384
  • [29] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings
    Liu Xin
    Xu Qiu-liang
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
  • [30] Identity-Based Key Management Scheme for Smart Grid over Lattice
    Yu, Wangke
    Wang, Shuhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96