Abstract
Identity-based public key cryptosystem may perfectly substitute the traditional certificate-based public key system if only the efficiency and security of key issuing are satisfied. Recently, interacting neural network has been studied with a novel result that the two neural networks can synchronize to a stationary weight space with the identical inputs. So we propose a tree parity machine model for secure key agreement purpose, and ID-based private key secure issuing over a complete public channel, as well as secure authentication to user, are all proposed in this paper.
Partially supported by Zhejiang Province Natural Science Fund (Y104158) and Technology Development Fund of Zhejiang University of Technology.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shamir, A.: Identity-base Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, F.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Chen, L., Harrison, K., Smart, N.P., Soldera, D.: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 260–275. Springer, Heidelberg (2002)
Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Identity-based Threshold Ring Signature. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 218–232. Springer, Heidelberg (2005)
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure Key Issuing in ID-Based Cryptography. In: ACM Second Australasian Information Security Workshop (AISW 2004), New Zealand, pp. 69–74 (2004)
Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Metzler, R., Kinzel, W.: Interacting Neural Networks. Phys. Rev. E. 62, 2555–2562 (2000)
Kinzel, W., Kanter, I.: Interacting Neural Network and Cryptography. Advances in Solid State Physics 42, 383–391 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, T., Chen, B., Cai, J. (2005). A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3497. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427445_104
Download citation
DOI: https://doi.org/10.1007/11427445_104
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25913-8
Online ISBN: 978-3-540-32067-8
eBook Packages: Computer ScienceComputer Science (R0)