Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network

  • Conference paper
Advances in Neural Networks – ISNN 2005 (ISNN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3497))

Included in the following conference series:

  • 1609 Accesses

Abstract

Identity-based public key cryptosystem may perfectly substitute the traditional certificate-based public key system if only the efficiency and security of key issuing are satisfied. Recently, interacting neural network has been studied with a novel result that the two neural networks can synchronize to a stationary weight space with the identical inputs. So we propose a tree parity machine model for secure key agreement purpose, and ID-based private key secure issuing over a complete public channel, as well as secure authentication to user, are all proposed in this paper.

Partially supported by Zhejiang Province Natural Science Fund (Y104158) and Technology Development Fund of Zhejiang University of Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Shamir, A.: Identity-base Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, F.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Chen, L., Harrison, K., Smart, N.P., Soldera, D.: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 260–275. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Identity-based Threshold Ring Signature. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 218–232. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure Key Issuing in ID-Based Cryptography. In: ACM Second Australasian Information Security Workshop (AISW 2004), New Zealand, pp. 69–74 (2004)

    Google Scholar 

  6. Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Metzler, R., Kinzel, W.: Interacting Neural Networks. Phys. Rev. E. 62, 2555–2562 (2000)

    Article  Google Scholar 

  8. Kinzel, W., Kanter, I.: Interacting Neural Network and Cryptography. Advances in Solid State Physics 42, 383–391 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, T., Chen, B., Cai, J. (2005). A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3497. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427445_104

Download citation

  • DOI: https://doi.org/10.1007/11427445_104

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25913-8

  • Online ISBN: 978-3-540-32067-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics