Presentation | 1998/12/10 Revocable and Renewable ID-based Key Distribution System for User's Secret Information Takeshi OKAMOTO, Eiji OKAMOTO, Mitsuru TADA, Ken'ichiro KAMACHI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this paper, a new identity-based key distribution system(ID-KDS)is proposed. In usual schemes, a trusted center must discard the user's ID information and use a different one when the center revokes a user's secret information. But in our scheme, there is no need for the center to do that. After revocation and renewal of a user's secret information, the center can use the same ID, which has been used before. Breaking our proposed scheme is equivalent to breaking the Diffie-Hellman cryptosystem, and impersonation depends on the difficulty of computing RSA. The conceptual structure of our proposed scheme is also discussed. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | ID-based Key Distribution System / Diffie-Hellman / RSA / reducibility |
Paper # | ISEC98-48 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/12/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Revocable and Renewable ID-based Key Distribution System for User's Secret Information |
Sub Title (in English) | |
Keyword(1) | ID-based Key Distribution System |
Keyword(2) | Diffie-Hellman |
Keyword(3) | RSA |
Keyword(4) | reducibility |
1st Author's Name | Takeshi OKAMOTO |
1st Author's Affiliation | System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology() |
2nd Author's Name | Eiji OKAMOTO |
2nd Author's Affiliation | System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology |
3rd Author's Name | Mitsuru TADA |
3rd Author's Affiliation | System Control and Management, Okamoto Laboratory, School of Information Science, Japan Advanced Institute of Science and Technology |
4th Author's Name | Ken'ichiro KAMACHI |
4th Author's Affiliation | Advanced Mobile Telecommunications Security Technology Research Laboratories Co., Ltd. |
Date | 1998/12/10 |
Paper # | ISEC98-48 |
Volume (vol) | vol.98 |
Number (no) | 464 |
Page | pp.pp.- |
#Pages | 11 |
Date of Issue |