Presentation 1998/12/10
Revocable and Renewable ID-based Key Distribution System for User's Secret Information
Takeshi OKAMOTO, Eiji OKAMOTO, Mitsuru TADA, Ken'ichiro KAMACHI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, a new identity-based key distribution system(ID-KDS)is proposed. In usual schemes, a trusted center must discard the user's ID information and use a different one when the center revokes a user's secret information. But in our scheme, there is no need for the center to do that. After revocation and renewal of a user's secret information, the center can use the same ID, which has been used before. Breaking our proposed scheme is equivalent to breaking the Diffie-Hellman cryptosystem, and impersonation depends on the difficulty of computing RSA. The conceptual structure of our proposed scheme is also discussed.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) ID-based Key Distribution System / Diffie-Hellman / RSA / reducibility
Paper # ISEC98-48
Date of Issue

Conference Information
Committee ISEC
Conference Date 1998/12/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Revocable and Renewable ID-based Key Distribution System for User's Secret Information
Sub Title (in English)
Keyword(1) ID-based Key Distribution System
Keyword(2) Diffie-Hellman
Keyword(3) RSA
Keyword(4) reducibility
1st Author's Name Takeshi OKAMOTO
1st Author's Affiliation System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology()
2nd Author's Name Eiji OKAMOTO
2nd Author's Affiliation System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology
3rd Author's Name Mitsuru TADA
3rd Author's Affiliation System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology
4th Author's Name Ken'ichiro KAMACHI
4th Author's Affiliation Advanced Mobile Telecommunications Security Technology Research Laboratories Co., Ltd.
Date 1998/12/10
Paper # ISEC98-48
Volume (vol) vol.98
Number (no) 464
Page pp.pp.-
#Pages 11
Date of Issue