Identity-Based Cryptosystems and Signature Schemes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1985

AUTHORS

Adi Shamir

ABSTRACT

In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. The scheme assumes the existence of trusted key generation centers, whose sole purpose is to give each user a personalized smart card when he first joins the network. The information embedded in this card enables the user to sign and encrypt the messages he sends and to decrypt and verify the messages he receives in a totally independent way, regardless of the identity of the other party. Previously issued cards do not have to be updated when new users join the network, and the various centers do not have to coordinate their activities or even to keep a user list. The centers can be closed after all the cards are issued, and the network can continue to function in a completely decentralized way for an indefinite period. More... »

PAGES

47-53

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-39568-7_5

DOI

http://dx.doi.org/10.1007/3-540-39568-7_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1029422590


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Weizmann Institute of Science", 
          "id": "https://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Applied Mathematics, The Weizmann Institute of Science, Rehovot, 76100, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shamir", 
        "givenName": "Adi", 
        "id": "sg:person.013052746407.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052746407.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1985", 
    "datePublishedReg": "1985-01-01", 
    "description": "In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other\u2019s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. The scheme assumes the existence of trusted key generation centers, whose sole purpose is to give each user a personalized smart card when he first joins the network. The information embedded in this card enables the user to sign and encrypt the messages he sends and to decrypt and verify the messages he receives in a totally independent way, regardless of the identity of the other party. Previously issued cards do not have to be updated when new users join the network, and the various centers do not have to coordinate their activities or even to keep a user list. The centers can be closed after all the cards are issued, and the network can continue to function in a completely decentralized way for an indefinite period.", 
    "editor": [
      {
        "familyName": "Blakley", 
        "givenName": "George Robert", 
        "type": "Person"
      }, 
      {
        "familyName": "Chaum", 
        "givenName": "David", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-39568-7_5", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-15658-1"
      ], 
      "name": "Advances in Cryptology", 
      "type": "Book"
    }, 
    "name": "Identity-Based Cryptosystems and Signature Schemes", 
    "pagination": "47-53", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-39568-7_5"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "8c2a09cfd979a31d6c95664a7725c208b7ad4e1e7d8cabf22d83e0fec4fd11fd"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1029422590"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-39568-7_5", 
      "https://app.dimensions.ai/details/publication/pub.1029422590"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T17:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000050.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-39568-7_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-39568-7_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-39568-7_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-39568-7_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-39568-7_5'


 

This table displays all metadata directly associated to this object as RDF triples.

69 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-39568-7_5 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N094b188fefe9438d94a395ab8041c9e5
4 schema:datePublished 1985
5 schema:datePublishedReg 1985-01-01
6 schema:description In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. The scheme assumes the existence of trusted key generation centers, whose sole purpose is to give each user a personalized smart card when he first joins the network. The information embedded in this card enables the user to sign and encrypt the messages he sends and to decrypt and verify the messages he receives in a totally independent way, regardless of the identity of the other party. Previously issued cards do not have to be updated when new users join the network, and the various centers do not have to coordinate their activities or even to keep a user list. The centers can be closed after all the cards are issued, and the network can continue to function in a completely decentralized way for an indefinite period.
7 schema:editor N547ac97317594556ab3d0bcfd897ccc3
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N2d820d2c88d84d05a7b4f6025a0cf1bd
12 schema:name Identity-Based Cryptosystems and Signature Schemes
13 schema:pagination 47-53
14 schema:productId N2d21af365c0a4cbc876890339970575b
15 N2db30ab2dc1f43a3b30c23b8455384c7
16 N728650dd58c04686a30bcfd4ccb9fb14
17 schema:publisher N6240054458334213a5610b72ef562a8e
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029422590
19 https://doi.org/10.1007/3-540-39568-7_5
20 schema:sdDatePublished 2019-04-15T17:01
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher Necbfd470f5204dcfa32d584654d3f777
23 schema:url http://link.springer.com/10.1007/3-540-39568-7_5
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N094b188fefe9438d94a395ab8041c9e5 rdf:first sg:person.013052746407.28
28 rdf:rest rdf:nil
29 N16f34f3c6f224b4db5e972ff5b1e03b9 schema:familyName Blakley
30 schema:givenName George Robert
31 rdf:type schema:Person
32 N1aad99b67ae2464eb9a9685363ab49fb rdf:first N9c9213bbd3204f8f82b65fae7375d2a7
33 rdf:rest rdf:nil
34 N2d21af365c0a4cbc876890339970575b schema:name readcube_id
35 schema:value 8c2a09cfd979a31d6c95664a7725c208b7ad4e1e7d8cabf22d83e0fec4fd11fd
36 rdf:type schema:PropertyValue
37 N2d820d2c88d84d05a7b4f6025a0cf1bd schema:isbn 978-3-540-15658-1
38 schema:name Advances in Cryptology
39 rdf:type schema:Book
40 N2db30ab2dc1f43a3b30c23b8455384c7 schema:name dimensions_id
41 schema:value pub.1029422590
42 rdf:type schema:PropertyValue
43 N547ac97317594556ab3d0bcfd897ccc3 rdf:first N16f34f3c6f224b4db5e972ff5b1e03b9
44 rdf:rest N1aad99b67ae2464eb9a9685363ab49fb
45 N6240054458334213a5610b72ef562a8e schema:location Berlin, Heidelberg
46 schema:name Springer Berlin Heidelberg
47 rdf:type schema:Organisation
48 N728650dd58c04686a30bcfd4ccb9fb14 schema:name doi
49 schema:value 10.1007/3-540-39568-7_5
50 rdf:type schema:PropertyValue
51 N9c9213bbd3204f8f82b65fae7375d2a7 schema:familyName Chaum
52 schema:givenName David
53 rdf:type schema:Person
54 Necbfd470f5204dcfa32d584654d3f777 schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
57 schema:name Information and Computing Sciences
58 rdf:type schema:DefinedTerm
59 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
60 schema:name Information Systems
61 rdf:type schema:DefinedTerm
62 sg:person.013052746407.28 schema:affiliation https://www.grid.ac/institutes/grid.13992.30
63 schema:familyName Shamir
64 schema:givenName Adi
65 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052746407.28
66 rdf:type schema:Person
67 https://www.grid.ac/institutes/grid.13992.30 schema:alternateName Weizmann Institute of Science
68 schema:name Department of Applied Mathematics, The Weizmann Institute of Science, Rehovot, 76100, Israel
69 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...