ID-based cryptographic schemes for user identification, digital signature, and key distribution

L. Harn, S. Yang
1993 IEEE Journal on Selected Areas in Communications  
Abstrucf-In 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the "identity" of his communication partner and the public key of the KAC. There is no public file required in this system. However,
more » ... Shamir did not succeed in constructing an identitybased cryptosystem, but only in constructing an identity-based signature scheme. In this paper, we propose three identity-based cryptographic schemes based on the discrete logarithm problem: the user identification scheme, the digital signature scheme, and the key distribution scheme. YA = crZA modp 0733-8716/92$03.00 0 1992 IEEE
doi:10.1109/49.223877 fatcat:ri34ow5vl5gnnex4zucb6jypla