Identity based and key insulated cryptosystem
The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model wa...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74651659/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537605045321728 |
---|---|
author | ZHOU Yuan1 QIN Bao-shan 2 CAO Zhen-fu 3 |
author_facet | ZHOU Yuan1 QIN Bao-shan 2 CAO Zhen-fu 3 |
author_sort | ZHOU Yuan1 |
collection | DOAJ |
description | The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed. |
format | Article |
id | doaj-art-446167c629464d188dd021638c2ae8f5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-446167c629464d188dd021638c2ae8f52025-01-14T08:29:34ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130212674651659Identity based and key insulated cryptosystemZHOU Yuan1QIN Bao-shan 2CAO Zhen-fu 3The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed.http://www.joconline.com.cn/zh/article/74651659/identity-based cryptosystemkey insulated cryptosystembilinear pairing |
spellingShingle | ZHOU Yuan1 QIN Bao-shan 2 CAO Zhen-fu 3 Identity based and key insulated cryptosystem Tongxin xuebao identity-based cryptosystem key insulated cryptosystem bilinear pairing |
title | Identity based and key insulated cryptosystem |
title_full | Identity based and key insulated cryptosystem |
title_fullStr | Identity based and key insulated cryptosystem |
title_full_unstemmed | Identity based and key insulated cryptosystem |
title_short | Identity based and key insulated cryptosystem |
title_sort | identity based and key insulated cryptosystem |
topic | identity-based cryptosystem key insulated cryptosystem bilinear pairing |
url | http://www.joconline.com.cn/zh/article/74651659/ |
work_keys_str_mv | AT zhouyuan1 identitybasedandkeyinsulatedcryptosystem AT qinbaoshan2 identitybasedandkeyinsulatedcryptosystem AT caozhenfu3 identitybasedandkeyinsulatedcryptosystem |