An efficient ID-KEM based on the Sakai-Kasahara key construction
Cheng, Zhaohui and Malone-Lee, John and Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722
Full text is not in this repository.
Official URL: http://scitation.aip.org/dbt/dbt.jsp?KEY=IPISAH&Vo...
This item is available in the Library Catalogue
This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.
|Item Type:||Book Section|
|Research Areas:||Science & Technology > Algorithms, Architecture & Networks|
|Deposited On:||21 Oct 2008 13:31|
|Last Modified:||01 Apr 2014 07:46|
Repository Staff Only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year