An Efficient ID-based Beta Cryptosystem

Download Now
Provided by: Science & Engineering Research Support soCiety (SERSC)
Topic: Security
Format: PDF
In this system, users need to visit a Public Key Generation (PKG) and identify themselves before joining a communication network. Once a user is accepted, the PKG will provide them with a secret key. In this way, if they want to communicate with others, they need to know only the "Identity" of their communication partner and the public key of the PKG. There is no public file required in this system. However, the researcher did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme.
Download Now

Find By Topic