An Identity Based Encryption Scheme Based on Quadratic Residues

  • Clifford Cocks
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2260)


We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the proposed scheme, and show that this is related to the difficulty of solving the quadratic residuosity problem


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    C Cocks Split Generation of RSA Parameters with Multiple Participants Proceedings of 6th IMA conference on Cryptography and Coding, Springer LNCS 1355.Google Scholar
  2. 2.
    H Cohen A Course in Computational Algebraic Number Theory Springer-Verlag graduate texts in mathematics 138, 1993Google Scholar
  3. 3.
    D Boneh, M Franklin Identity-Based Encryption from the Weil Pairing Advances in Cryptology — Crypto2001, Springer LNCS 2139Google Scholar
  4. 4.
    A. Shamir Identity Based Cryptosystems and Signature Schemes Advances in Cryptology — Proceedings of Crypto’ 84.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Clifford Cocks
    • 1
  1. 1.Communications-Electronics Security GroupCheltenham

Personalised recommendations