Verifiable Self-Certified Identification and Key-Distribution Protocols


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 6, No. 10, pp. 2722-2727, Oct. 1999
10.3745/KIPSTE.1999.6.10.2722,   PDF Download:

Abstract

In this paper we propose verifiable self-certified identification and key distribution protocols which has advantages of certificate-based scheme and Girault's self-certified public key. The security of the proposed protocols is based on rth_ residuosity problem and discrete logarithm problem.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. K. Kug, Y. J. Suk, W. D. Ho, "Verifiable Self-Certified Identification and Key-Distribution Protocols," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 6, no. 10, pp. 2722-2727, 1999. DOI: 10.3745/KIPSTE.1999.6.10.2722.

[ACM Style]
Kim Kyung Kug, Yu Joon Suk, and Won Dong Ho. 1999. Verifiable Self-Certified Identification and Key-Distribution Protocols. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 6, 10, (1999), 2722-2727. DOI: 10.3745/KIPSTE.1999.6.10.2722.