透過您的圖書館登入
IP:3.15.37.162
  • 學位論文

對於離散對數密碼系統的身份的加密模式

An Identity-based Cryptographic Model for Discrete Logarithm Cryptosystems

指導教授 : 廖文欽
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


無資料

關鍵字

身分 密碼學

並列摘要


In this thesis we present methods of fi nding discrete logarithms in fi elds GF(p) and GF(p^2). Based on the discrete logarithm, an identity-based (ID-based) cryptosystem is constructed. We shall illustrate the discrete logarithm method of decryption and ID-based method of encryption. The notion of the ID-based system can be applied to all of the discrete logarithm based cryptosystems without changing their original design. This is advantageous to public-key cryptosystems since the public-key authentication is easy and this reduces key management.

並列關鍵字

Identity-based GF(p) GF(p^2) IBE

參考文獻


[2] L. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, in: Proc. 20th Ann. FOCS Conf., Oct. 1979, pp. 55-60.
[4] C. Cocks, An identity based encryption scheme based on quadratic residues, in: LNCS vol. 2260, Springer-Verlag, Proc. IMA London, 2001, pp. 360-363.
[5] D. Coppersmith and A. M. Odlyzko, Discrete logarithms in nite elds and their cryptographic signi cance, in: LNCS vol. 209, Springer-Verlag, Proc. Crypto'84, New York, 1985, pp. 224-314.
[6] D. Coppersmith, A. M. Odlzyko, and R. Schroeppel, Discrete logarithms in GF(p),Algorithmica 1 (1986), 1-15.
[7] W. Die and M. Hellman, New directions in cryptography, IEEE Trans. Info. Theo. 22 (6) (1976), 644-654.

延伸閱讀