Key distribution system based on identification information
- 1 May 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 7 (4) , 481-485
- https://doi.org/10.1109/49.17711
Abstract
A key distribution system (KDS) based on identification information (ID-based KDS) is presented. The system is founded on the Diffie-Hellman public key distribution scheme and has an identity authentication function. It uses an individual user's identification information instead of the public file used in the Diffie-Hellman scheme. It does not require any services of a center to distribute work keys or users to keep directories of key-encrypting keys. Therefore, key management in cryptosystems can be simplified by adopting the ID-based KDS. Two kinds of identity-based key distribution system are proposed and applied to actual communication networks. One uses two-way (interactive) communication to distribute work keys, while the other uses one-way communication. Modular exponentiations of large numbers, used in the systems, are implemented with digital signal processors.Keywords
This publication has 9 references indexed in Scilit:
- Identity-based information security management system for personal computer networksIEEE Journal on Selected Areas in Communications, 1989
- ID-based cryptosystem using discrete logarithm problemElectronics Letters, 1987
- A single public‐key authentication scheme for multiple usersSystems and Computers in Japan, 1987
- Proposal for identity-based key distribution systemsElectronics Letters, 1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A “WEAK” PRIVACY PROTOCOL USING THE RSA CRYPTO ALGORITHMCryptologia, 1983
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Cryptography architecture for information securityIBM Systems Journal, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976