Abstract
This paper proposes new public-key cryptosystems systems the security of which is based on the tamperfreeness of a device and the existence of secret key cryptosystems instead of the computational complexity of a trapdoor one-way function (RSA).
Chapter PDF
Similar content being viewed by others
References
George Davida and Brian Matt, “Arbitration in tamper proof systems”, in These proceedings, 1987.
Yvo Desmedt and Jean-Jacques Quisquater, “Public-key systems based on the difficulty of tampering (Is there a difference between DES and RSA?), In Proceedings of CRYPTO’ 86, Springer-Verlag, Berlin, 1987.
Adi Shamir, “Identity-based cryptosystems and signature schemes”, in Proceedings of CRYPTO’ 84, Springer-Verlag, Berlin, 1985, pp. 46–53.
Gustavus J. Simmons, “The prisoner’s problem and the subliminal channel, in Proceedings of CRYPTO’ 83, Plenum Press, New York, 1984, pp. 51–67.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Quisquater, JJ. (1988). Secret Distribution of Keys for Public-Key Systems. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_16
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive