An efficient ID-KEM based on the Sakai-Kasahara key construction

Cheng, Zhaohui and Malone-Lee, John and Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722

Full text is not in this repository.

This item is available in: Library Catalogue

Abstract

This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.

Item Type: Book Section
Research Areas: A. > School of Science and Technology > Computer and Communications Engineering
Item ID: 101
Depositing User: Repository team
Date Deposited: 21 Oct 2008 13:31
Last Modified: 13 May 2014 15:37
URI: http://eprints.mdx.ac.uk/id/eprint/101

Actions (login required)

Edit Item Edit Item