A new probabilistic ID-based non-interactive key sharing scheme

被引:0
|
作者
Murakami, Y [1 ]
Sakai, R
Kasahara, M
机构
[1] Kyoto Inst Technol, Dept Elect & Informat Sci, Kyoto 6068585, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
关键词
ID; key sharing; non-interactive; ID-based noninteractive key sharing scheme (ID-NIKS); linear attack; collusion attack;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new probabilistic ID-based noninteractive key sharing scheme that has non-separable secret-key functions and a non-separable common-key function. The proposed scheme uses the calculation over modulo-P, modulo-Q and over integer ring for realizing non-separability, This proposed scheme has a large threshold against linear attack by the collusive entities.
引用
收藏
页码:2 / 9
页数:8
相关论文
共 50 条
  • [21] New ID-based identification scheme
    Li, Yan-Ping
    Su, Wan-Li
    Wang, Yu-Min
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
  • [22] A non-interactive modular verifiable secret sharing scheme
    Li, Q
    Wang, ZF
    Niu, XM
    Sun, SH
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 84 - 87
  • [23] A NEW CLASS OF NONINTERACTIVE ID-BASED KEY SHARING SCHEMES AND ITS PERFORMANCES
    SAKAI, R
    KASAHARA, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1995, E78A (01) : 51 - 58
  • [25] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [26] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
  • [27] An ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 18 - +
  • [28] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685
  • [29] ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (05): : 857 - 863
  • [30] Non-interactive verifiable LWE-based multi secret sharing scheme
    Niloofar Kiamari
    Massoud Hadian
    Samaneh Mashhadi
    Multimedia Tools and Applications, 2023, 82 : 22175 - 22187