An efficient ID-KEM based on the Sakai-Kasahara key construction

Cheng, Zhaohui, Malone-Lee, John, Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722. [Book Section] (doi:10.1049/ip-ifs:20055070)


This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.

Item Type: Book Section
Research Areas: A. > School of Science and Technology > Computer and Communications Engineering
Item ID: 101
Depositing User: Repository team
Date Deposited: 21 Oct 2008 13:31
Last Modified: 13 Oct 2016 14:11

Actions (login required)

View Item View Item


Activity Overview

Additional statistics are available via IRStats2.