Abstract
Two types of key distribution systems based on identification information are proposed, one for decentralized networks and the other for centralized networks. The system suitable for decentralized networks is analogous to the Diffie-Hellman public key distribution system, in which the former uses each user’s identification information instead of a public file used in the latter. The proposed system is able to defend the networks from impostors. The system suitable for centralized networks, which is less analogous to the Diffie-Hellman system, can also defend the networks from impostors, though the network center does not have any directory of public or private key-encrypting keys of the users. Both of the systems proposed in this paper do not require any services of a center to distribute work keys, or users to keep directories of key-encrypting keys. Therefore, key management in cryptosystems can be practical and simplified by adopting the identity-based key distribution systems.
Chapter PDF
References
Diffie, W., and Hellman, M.E.: “New directions in cryptography,” IEEE Trans., IT-22, pp.644–654, 1976.
Okamoto, E.: “Proposal for identity-based key distribution systems,” Electronics Letters, 22, pp.1283–1284, 1986.
Shamir, A.: “Identity-based cryptosystems and signature schemes,” Proc. Crypto 84, Santa Barbara, August 1984, pp.47–53.
Kohnfelder, L.: “Towards a practical public-key cryptosystem,” B.S. Thesis, M.I.T., Cambridge, Mass.
Rivest, R.L., Shamir, A., and Adleman, L.: “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, 21, pp.120–126, 1978.
Simmons, G.J.: “A ‘weak’ privacy protocol Using the RSA crypto algorithm,” Cryptologia, 7, pp.180–182, 1983.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Okamoto, E. (1988). Key Distribution Systems Based on Identification Information. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_15
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive