A Survey on ID-Based Cryptographic Primitives.

作者: M. Choudary Gorantla , Raju Gangishetti , Ashutosh Saxena

DOI:

关键词:

摘要: ID-based cryptosystem has been, for a few years, the most active area of research and currently is great interest to cryptographic society. In this work we survey three fundamental primitives Digital Signature, Encryption Key Agreement, which are based on mathematical concepts Integer Factorization, Quadratic Residues Bilinear Pairings. We review several schemes along with their efficiency security considerations. The helps in understanding carried out cryptosystems from year 1984 2004.

参考文章(67)
Rana Barua, Palash Sarkar, Ratna Dutta, Pairing-Based Cryptographic Protocols : A Survey. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 64- ,(2004)
Mike Scott, Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number. IACR Cryptology ePrint Archive. ,vol. 2002, pp. 164- ,(2002)
Kaoru Kurosawa, Swee-Huay Heng, From Digital Signature to ID-based Identification/Signature public key cryptography. pp. 248- 261 ,(2004) , 10.1007/978-3-540-24632-9_18
Jung Hee Cheon, HyoJin Yoon, Yongdae Kim, A New ID-based Signature with Batch Verification. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 131- ,(2004)
Benoît Libert, Jean-Jacques Quisquater, The Exact Security of an Identity Based Signature and its Applications. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 102- ,(2004)
Hung-Min Sun, Bin-Tsan Hsieh, Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings. IACR Cryptology ePrint Archive. ,vol. 2003, pp. 113- ,(2003)
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung, Strong Key-Insulated Signature Schemes public key cryptography. ,vol. 2567, pp. 130- 144 ,(2003) , 10.1007/3-540-36288-6_10
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes international cryptology conference. pp. 26- 45 ,(1998) , 10.1007/BFB0055718
Thomas Hardjono, Josef Pieprzyk, Jennifer Seberry, Fundamentals of Computer Security ,(2003)