A comparison between traditional public key infrastructures and identity-based cryptography
Tài liệu tham khảo
W Diffie and M Hellman, 1976. New directions in cryptography, IEEE Transactions on Information Theory, IT-22(6):644–654.
R L Rivest, A Shamir and L Adleman, February 1978. A method for obtaining digital signatures and public-key cryptosystems, Communications of the A.C.M., 21(2):120–126.
A Shamir, 1984. Identity-based cryptosystems and signature schemes. Advances in Cryptology — CRYPTO ’84, volume 196 of LNCS, pages 47–53. Springer-Verlag.
D Boneh and M Franklin, 2001. Identity-based encryption from the Weil pairing, Advances in Cryptology — CRYPTO 2001 (ed J Kilian), volume 2139 of LNCS, pages 213–229. Springer-Verlag.
C Gentry and A Silverberg, 2002. Hierarchical ID-based cryptography, Advances in Cryptology — ASIACRYPT 2002 (ed Y Zheng), volume 2501 of LNCS, pages 548–566. Springer-Verlag.
L Chen, K Harrison, D Soldera and N P Smart, 2002. Applications of multiple trust authorities in pairing based cryptosystems, Infrastructure Security, International Conference, InfraSec, (ed G I Davida, Y Frankel and O Rees), volume 2437 of LNCS, pages 260–275. Springer-Verlag.
EU Directive 1999/93/EC of the European Parliament and of the Council on a Community framework for electronic signatures, December 1999: http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/l_013/l_01320000119en00%120020.pdf
C Ellison, September 1999. SPKI requirements, IETF RFC 2692: http://www.ietf.org/rfc/rfc2692.txt
P Gutmann, 2002. PKI: It’s not dead, just resting. IEEE Computer 35(8):41–49.
C Gentry, 2003. Certificate-based encryption and the certificate revocation problem, Advances in Cryptology — EUROCRYPT 2003 (ed E Biham), volume 2656 of LNCS, pages 272–293. Springer-Verlag.
S S Al-Riyami and K G Paterson, 2003. Certificateless public key cryptography, Proceedings of Asiacrypt 2003, Lecture Notes in Computer Science (to appear).
