An efficient ID-KEM based on the Sakai-Kasahara key construction

Cheng, Zhaohui and Malone-Lee, John and Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722

Full text is not in this repository.

Official URL:

This item is available in the Library Catalogue


This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.

Item Type:Book Section
Research Areas:A. > School of Science and Technology > Computer and Communications Engineering
ID Code:101
Deposited On:21 Oct 2008 13:31
Last Modified:13 May 2014 15:37

Repository staff only: item control page

Full text downloads (NB count will be zero if no full text documents are attached to the record)

Downloads per month over the past year