An ID-based cryptosystem based on the discrete logarithm problem
- 1 May 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 7 (4) , 467-473
- https://doi.org/10.1109/49.17709
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?)Published by Springer Nature ,2000
- How To Prove Yourself: Practical Solutions to Identification and Signature ProblemsPublished by Springer Nature ,2000
- On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution ProblemPublished by Springer Nature ,1988
- ID-based cryptosystem using discrete logarithm problemElectronics Letters, 1987
- Identity-based conference key distribution systemElectronics Letters, 1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- Riemann's hypothesis and tests for primalityJournal of Computer and System Sciences, 1976
- New directions in cryptographyIEEE Transactions on Information Theory, 1976