Non-Interactive Public-key Cryptography
Ueli Maurer and Yacov Yacobi
An identity-based non-interactive public key distribution system is presented that is based on a novel trapdoor one-way function allowing a trusted authority to compute the discrete logarithm of a given number modulo a publicly known composite number $m$ while this is infeasible for an adversary not knowing the factorization of $m$. Without interaction with a key distribution center or with the recipient of a given message a user can generate a mutual secure cipher key based solely on the recipient's identity and his own secret key and send the message, encrypted with the generated cipher key using a conventional cipher, over an insecure channel to the recipient. Unlike in previously proposed identity-based systems, no public keys, certificates for public keys or other information need to be exchanged and thus the system is suitable for many applications such as electronic mail that do not allow for interaction.
BibTeX Citation
@inproceedings{MauYac91, author = {Ueli Maurer and Yacov Yacobi}, title = {Non-Interactive Public-key Cryptography}, booktitle = {Advances in Cryptology --- EUROCRYPT~'91}, pages = {498--507}, series = {Lecture Notes in Computer Science}, volume = {547}, year = {1991}, month = {4}, note = {Final version: \cite{MauYac96}, see also the note in \cite{MauYac92}}, publisher = {Springer-Verlag}, }
Files and Links
- There are currently no associated files available.