Abstract

In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

Keywords

CryptosystemComputer scienceDiscrete logarithmPublic-key cryptographyTheoretical computer scienceKey (lock)Hybrid cryptosystemCryptographyComputer securityLogarithmDigital signatureEncryptionMathematicsHash function

Affiliated Institutions

Related Publications

Publication Info

Year
1989
Type
article
Volume
7
Issue
4
Pages
467-473
Citations
190
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

190
OpenAlex

Cite This

Shigeo Tsujii, Toshiya Itoh (1989). An ID-based cryptosystem based on the discrete logarithm problem. IEEE Journal on Selected Areas in Communications , 7 (4) , 467-473. https://doi.org/10.1109/49.17709

Identifiers

DOI
10.1109/49.17709