An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks
- 1 January 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Multisecret Threshold SchemesPublished by Springer Nature ,2001
- A Remark on a Non-interactive Public-Key Distribution SystemPublished by Springer Nature ,2001
- A New ID-Based Key Sharing SystemPublished by Springer Nature ,2001
- Non-interactive Public-Key CryptographyPublished by Springer Nature ,2001
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Nature ,2000
- Perfectly-Secure Key Distribution for Dynamic ConferencesPublished by Springer Nature ,1993
- Identity-based information security management system for personal computer networksIEEE Journal on Selected Areas in Communications, 1989
- A Realization Scheme for the Identity-Based CryptosystemPublished by Springer Nature ,1988
- On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution ProblemPublished by Springer Nature ,1988
- Non-Public Key DistributionPublished by Springer Nature ,1983