[go: up one dir, main page]

Zhang et al., 2009 - Google Patents

An efficient certificate-based signature scheme without pairings

Zhang et al., 2009

Document ID
17002052326768500177
Author
Zhang J
Chen H
Geng Q
Publication year
Publication venue
2009 Second International Workshop on Computer Science and Engineering

External Links

Snippet

Certificate-based cryptography solves certificate revocation problem and eliminate third- party queries in the traditional PKI and avoid key escrow in the ID-based cryptography. It is a better alternative for the traditional public key system. In this paper, we proposed an efficient …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key

Similar Documents

Publication Publication Date Title
Li et al. Certificate-based signature: security model and efficient construction
Liu et al. Certificate-based signature schemes without pairings or random oracles
Li et al. Hidden attribute-based signatures without anonymity revocation
Huang et al. Certificateless signatures: new schemes and security models
Au et al. Certificate based (linkable) ring signature
Wu et al. A new efficient certificateless signcryption scheme
US8225098B2 (en) Direct anonymous attestation using bilinear maps
He et al. An efficient certificateless designated verifier signature scheme.
Liu et al. Short and efficient certificate-based signature
Chow et al. Identity based ring signature: Why, how and what next
Zhang On the security of a certificate-based signature scheme and its improvement with pairings
Yuen et al. How to construct identity-based signatures without the key escrow problem
Liu et al. Efficient certificate-based encryption in the standard model
Islam et al. Certificateless strong designated verifier multisignature scheme using bilinear pairings
Seo et al. Identity-based universal designated multi-verifiers signature schemes
Liu et al. Certificate-based sequential aggregate signature
Wei et al. Group signature where group manager, members and open authority are identity-based
Tian et al. A systematic method to design strong designated verifier signature without random oracles
Du et al. Certificate-based key-insulated signature
Xiong et al. A provably secure proxy signature scheme in certificateless cryptography
Zhang et al. Certificateless signature and blind signature
Gao et al. One-round ID-based blind signature scheme without ROS assumption
Hung et al. A short certificate-based signature scheme with provable security
Wang et al. Two constructions of fuzzy identity based signature
Chen et al. New efficient certificateless blind signature scheme