Keyword : non-interactive key sharing


Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/03/01
Vol. E92-A  No. 3 ; pp. 932-934
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
non-interactive key sharingidentity-based cryptosystemcollusion attacks
 Summary | Full Text:PDF(64.8KB)

Collusion-Attack Free ID-Based Non-interactive Key Sharing
Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1820-1824
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
identity-informationnon-interactive key sharingidentity-based cryptosystemdiscrete logarithm problemfactoring problemcollusion-attack free
 Summary | Full Text:PDF(126.1KB) | Errata(Uploaded on September 1,2006)

Identity-Based Non-interactive Key Sharing
Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 20-23
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
identity informationnon-interactive key sharingidentity-based cryptosystempublic-key cryptosystem
 Summary | Full Text:PDF(309KB)