ID-based cryptography using symmetric primitives

Mitchell, Chris J, Piper, F. C. and Wild, P. R.

(2007)

Mitchell, Chris J, Piper, F. C. and Wild, P. R. (2007) ID-based cryptography using symmetric primitives. Designs, Codes and Cryptography, 44

Our Full Text Deposits

Full text access: Open

Full Text - 185.13 KB

Links to Copies of this Item Held Elsewhere


Abstract

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We make use of one-way functions and block designs with properties related to cover-free families to optimise the efficiency of our schemes.

Information about this Version

This is a Submitted version
This version's date is: 3/7/2007
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/76c570c2-e537-e2eb-3763-ca3987628df8/3/

Item TypeJournal Article
TitleID-based cryptography using symmetric primitives
AuthorsMitchell, Chris J
Piper, F. C.
Wild, P. R.
Uncontrolled KeywordsID-based cryptography, Symmetric primitives, One-time signature, Cover-free family
DepartmentsFaculty of Science\Mathematics
Research Groups and Centres\Information Security\ Information Security Group

Identifiers

doihttp://dx.doi.org/10.1007/s10623-007-9095-0

Deposited by Research Information System (atira) on 25-Jul-2012 in Royal Holloway Research Online.Last modified on 25-Jul-2012

Notes

The original publication is available at www.springerlink.com


Details