Advertisement

Key Distribution Systems Based on Identification Information

  • Eiji Okamoto
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 293)

Abstract

Two types of key distribution systems based on identification information are proposed, one for decentralized networks and the other for centralized networks. The system suitable for decentralized networks is analogous to the Diffie-Hellman public key distribution system, in which the former uses each user’s identification information instead of a public file used in the latter. The proposed system is able to defend the networks from impostors. The system suitable for centralized networks, which is less analogous to the Diffie-Hellman system, can also defend the networks from impostors, though the network center does not have any directory of public or private key-encrypting keys of the users. Both of the systems proposed in this paper do not require any services of a center to distribute work keys, or users to keep directories of key-encrypting keys. Therefore, key management in cryptosystems can be practical and simplified by adopting the identity-based key distribution systems.

References

  1. [1]
    Diffie, W., and Hellman, M.E.: “New directions in cryptography,” IEEE Trans., IT-22, pp.644–654, 1976.MathSciNetGoogle Scholar
  2. [2]
    Okamoto, E.: “Proposal for identity-based key distribution systems,” Electronics Letters, 22, pp.1283–1284, 1986.CrossRefGoogle Scholar
  3. [3]
    Shamir, A.: “Identity-based cryptosystems and signature schemes,” Proc. Crypto 84, Santa Barbara, August 1984, pp.47–53.Google Scholar
  4. [4]
    Kohnfelder, L.: “Towards a practical public-key cryptosystem,” B.S. Thesis, M.I.T., Cambridge, Mass.Google Scholar
  5. [5]
    Rivest, R.L., Shamir, A., and Adleman, L.: “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, 21, pp.120–126, 1978.MathSciNetzbMATHCrossRefGoogle Scholar
  6. [6]
    Simmons, G.J.: “A ‘weak’ privacy protocol Using the RSA crypto algorithm,” Cryptologia, 7, pp.180–182, 1983.zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • Eiji Okamoto
    • 1
  1. 1.Information Basic Research Laboratory, C&C Information Basic Research LaboratoryNEC CorporationKawasaki, KanagawaJapan

Personalised recommendations