1996
DOI: 10.1007/bf00129771
|View full text |Cite
|
Sign up to set email alerts
|

A non-interactive public-key distribution system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
29
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(29 citation statements)
references
References 21 publications
0
29
0
Order By: Relevance
“…This is extremely useful for applications which require the computation of many logarithms in the same field. To give an example, this was required by the identity based cryptosystem of Maurer and Yacobi [16]. …”
Section: Resultsmentioning
confidence: 99%
“…This is extremely useful for applications which require the computation of many logarithms in the same field. To give an example, this was required by the identity based cryptosystem of Maurer and Yacobi [16]. …”
Section: Resultsmentioning
confidence: 99%
“…One such example is the Boneh-Goh-Nissim homomorphic encryption [5], where in order to decrypt a ciphertext, a user has to first compute g m from the given ciphertext and then solve the discrete logarithm to recover the message m. Another example is the Maurer-Yacobi identity-based encryption [10]. Their construction uses a trapdoor discrete logarithm group, where the discrete logarithm problem is feasible to a user who has the trapdoor information, while hard for those who do not.…”
Section: Introductionmentioning
confidence: 99%
“…In 1991, Maurer and Yacobi presented a scheme referred to as MY [4], which is similar to our scheme, MK1. Maurer and Yacobi proposed improved versions of their scheme later [5,6]. All of these schemes can be regarded as a generalized version of Diffie-Hellman key sharing scheme using ID as a public key.…”
Section: Introductionmentioning
confidence: 99%