An efficient ID-KEM based on the Sakai-Kasahara key construction.
Cheng, Zhaohui , Malone-Lee, John, Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722
Full text is not in this repository.
Official URL: http://scitation.aip.org/dbt/dbt.jsp?KEY=IPISAH&Vo...
This item is available in the Library Catalogue
This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.
|Item Type:||Book Section|
|Research Areas:||Science & Technology > Algorithms, Architecture & Networks|
|Deposited On:||21 Oct 2008 13:31|
|Last Modified:||06 Feb 2013 11:27|
Repository Staff Only: item control page
Downloads per month over past year