Provably secure key-updating schemes in identity-based systems

0Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present Key-Updating Schemes in identity-based (identifi- cation or signature) systems, and consider the security of the schemes. We propose two kinds of key-updating schemes, i.e., one is sequential type and the other is parallel type, and show that both schemes arc equivalent to each other in a polynomial time sense, i.e., there exists a deterministic polynomial time algorithm that transforms the sequential key-updating scheme to the par- allel one, and vice versa. We also show that even if any polynomially many entities conspire to find a secret-key of any other entities, both key-updating schemes are provably secure against polynomially many times key-updating if decrypting RSA is hard.

Cite

CITATION STYLE

APA

Shinozaki, S., Itoh, T., Fujioka, A., & Tsujii, S. (1991). Provably secure key-updating schemes in identity-based systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 473 LNCS, pp. 16–30). Springer Verlag. https://doi.org/10.1007/3-540-46877-3_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free