An efficient ID-KEM based on the Sakai-Kasahara key construction
Cheng, Zhaohui, Malone-Lee, John, Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722. [Book Section] (doi:10.1049/ip-ifs:20055070)
Abstract
This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods. The proposed algorithm has been used in the industry (for example by Identum Ltd.) and is included in the IEEE P1363.3 standard draft.
Item Type: | Book Section |
---|---|
Research Areas: | A. > School of Science and Technology > Computer and Communications Engineering |
Item ID: | 101 |
Depositing User: | Repository team |
Date Deposited: | 21 Oct 2008 13:31 |
Last Modified: | 13 Oct 2016 14:11 |
URI: | https://eprints.mdx.ac.uk/id/eprint/101 |
Actions (login required)
![]() |
View Item |
Statistics
Additional statistics are available via IRStats2.