Identity based and key insulated cryptosystem
The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model wa...
Saved in:
Main Authors: | ZHOU Yuan1, QIN Bao-shan 2, CAO Zhen-fu 3 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74651659/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Perfect secrecy cryptosystem with nonuniform distribution of keys
by: Chuanjun TIAN
Published: (2018-11-01) -
Efficient signcryption scheme based on Cocks’ identity cryptosystem
by: Changgen PENG, et al.
Published: (2020-12-01) -
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
by: Newroz Nooralddin Abdulrazaq
Published: (2024-06-01) -
Further research on public-key cryptosystems based on third-order recurrence sequence
by: JIANG Zheng-tao 1, et al.
Published: (2005-01-01) -
Cryptanalysis of novel extended multivariate public key cryptosystem
by: Xu-yun NIE, et al.
Published: (2015-06-01)