ID-based cryptography using symmetric primitives

Chris J. Mitchell, Piper, F. C. and Wild, P. R.

(2007)

Chris J. Mitchell, Piper, F. C. and Wild, P. R. (2007) ID-based cryptography using symmetric primitives. Designs, Codes and Cryptography

Our Full Text Deposits

Full text access: Open

Full Text - 185.13 KB

Links to Copies of this Item Held Elsewhere


Abstract

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We make use of one-way functions and block designs with properties related to cover-free families to optimise the efficiency of our schemes.

Information about this Version

This is a Published version
This version's date is: 03/07/2007
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/76c570c2-e537-e2eb-3763-ca3987628df8/1/

Item TypeJournal Article
TitleID-based cryptography using symmetric primitives
AuthorsMitchell, Chris
Piper, F. C.
Wild, P. R.
Uncontrolled KeywordsID-based cryptography, Symmetric primitives, One-time signature, Cover-free family
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1007/s10623-007-9095-0

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

The original publication is available at www.springerlink.com


Details