Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography

@article{Kate2009AsynchronousDP,
  title={Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography},
  author={Aniket Kate and Ian Goldberg},
  journal={IACR Cryptology ePrint Archive},
  year={2009},
  volume={2009},
  pages={355}
}
Identity-based cryptography can greatly reduce the comple xity of sending encrypted messages over the Internet. However, it necessarily requires an entity known as a pr iv te-key generator (PKG), which can create private keys for users, and so can passively eavesdrop on all encrypt ed communications. Although a distributed privatekey generator has been suggested as a way to mitigate this pro blem, to date there have been no practical designs proposed for one. This paper presents the first… CONTINUE READING
Highly Cited
This paper has 43 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 29 extracted citations

A decentralized energy-aware key management scheme for Wireless Sensor Networks

2011 International Conference for Internet Technology and Secured Transactions • 2011
View 3 Excerpts
Highly Influenced

T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection

2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) • 2015
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 68 references

Asy nchronous verifiable secret sharing and proactive cryptosystems

C. Cachin, K. Kursawe, A.Lysyanskaya, R. Strobl
InACM Conference on Computer and Communications Security • 2002
View 4 Excerpts
Highly Influenced

Identity-Based Encryption from the Weil Pairing

View 17 Excerpts
Highly Influenced

Hierarchical Identity Based Encryption with Constant Size Ciphertext

IACR Cryptology ePrint Archive • 2005
View 14 Excerpts
Highly Influenced

Efficient identity-based encryption without random oracles

IACR Cryptology ePrint Archive • 2004
View 14 Excerpts
Highly Influenced

Hierarchical ID-Based Cryptography

IACR Cryptology ePrint Archive • 2002
View 14 Excerpts
Highly Influenced

Identity-Based Cryptosystems and Signature Schemes

CRYPTO • 1984
View 4 Excerpts
Highly Influenced

How to Share a Secret

Commun. ACM • 1979
View 5 Excerpts
Highly Influenced

Asynchronous Distributed Private - Key Generators for Identity - Based Cryptography

A. Kate, I. Goldberg
Cryptology ePrint Archive , Report • 2009

Similar Papers

Loading similar papers…