IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies 1989
DOI: 10.1109/infcom.1989.101551
|View full text |Cite
|
Sign up to set email alerts
|

A new scheme for ID-based cryptosystem and signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…As shown in the Table 1, compared with the schemes in [1,3], our scheme has less exponential operations in the signing phase. Comparing with the schemes in [1,5], our scheme has less exponential operations in the signature verification phase. Therefore, our scheme will need less time consuming, and our scheme is more efficient than the other schemes of this kind.…”
Section: Efficiency Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in the Table 1, compared with the schemes in [1,3], our scheme has less exponential operations in the signing phase. Comparing with the schemes in [1,5], our scheme has less exponential operations in the signature verification phase. Therefore, our scheme will need less time consuming, and our scheme is more efficient than the other schemes of this kind.…”
Section: Efficiency Comparisonmentioning
confidence: 99%
“…Unfortunately, their scheme has been proved not secure [4]. In 1989, Lath et al proposed an ID-based signature based on ElGamal signature [5]. But his scheme is inefficient with many exponential operations under modular.…”
Section: Introductionmentioning
confidence: 99%