Identity based and key insulated cryptosystem

The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model wa...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHOU Yuan1, QIN Bao-shan 2, CAO Zhen-fu 3
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74651659/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537605045321728
author ZHOU Yuan1
QIN Bao-shan 2
CAO Zhen-fu 3
author_facet ZHOU Yuan1
QIN Bao-shan 2
CAO Zhen-fu 3
author_sort ZHOU Yuan1
collection DOAJ
description The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed.
format Article
id doaj-art-446167c629464d188dd021638c2ae8f5
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-446167c629464d188dd021638c2ae8f52025-01-14T08:29:34ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130212674651659Identity based and key insulated cryptosystemZHOU Yuan1QIN Bao-shan 2CAO Zhen-fu 3The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed.http://www.joconline.com.cn/zh/article/74651659/identity-based cryptosystemkey insulated cryptosystembilinear pairing
spellingShingle ZHOU Yuan1
QIN Bao-shan 2
CAO Zhen-fu 3
Identity based and key insulated cryptosystem
Tongxin xuebao
identity-based cryptosystem
key insulated cryptosystem
bilinear pairing
title Identity based and key insulated cryptosystem
title_full Identity based and key insulated cryptosystem
title_fullStr Identity based and key insulated cryptosystem
title_full_unstemmed Identity based and key insulated cryptosystem
title_short Identity based and key insulated cryptosystem
title_sort identity based and key insulated cryptosystem
topic identity-based cryptosystem
key insulated cryptosystem
bilinear pairing
url http://www.joconline.com.cn/zh/article/74651659/
work_keys_str_mv AT zhouyuan1 identitybasedandkeyinsulatedcryptosystem
AT qinbaoshan2 identitybasedandkeyinsulatedcryptosystem
AT caozhenfu3 identitybasedandkeyinsulatedcryptosystem