An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the proposed scheme, and show that this is related to the difficulty of solving the quadratic residuosity problem
Unable to display preview. Download preview PDF.
- 1.C Cocks Split Generation of RSA Parameters with Multiple Participants Proceedings of 6th IMA conference on Cryptography and Coding, Springer LNCS 1355.Google Scholar
- 2.H Cohen A Course in Computational Algebraic Number Theory Springer-Verlag graduate texts in mathematics 138, 1993Google Scholar
- 3.D Boneh, M Franklin Identity-Based Encryption from the Weil Pairing Advances in Cryptology — Crypto2001, Springer LNCS 2139Google Scholar
- 4.A. Shamir Identity Based Cryptosystems and Signature Schemes Advances in Cryptology — Proceedings of Crypto’ 84.Google Scholar