Authenticated identity-based private key sharing scheme and its application

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to solve the private sharing problem in the authenticated identity-based scheme, combined with (t, n) threshold verifiable secret sharing scheme, a new private key sharing scheme is proposed, and with the existing private key sharing scheme, a comparative analysis is made, analysis shows that this scheme have a greater advantage in terms of efficiency and it’s also safety. Combined with authentication identity-based encryption scheme, a security electronic document interchange model in the government network is provided, to achieve the rapid exchange of electronic documents and to provide the security guarantee, through analysis shows that the scheme is safe and high efficiency.

Cite

CITATION STYLE

APA

Wan, W. (2019). Authenticated identity-based private key sharing scheme and its application. In Advances in Intelligent Systems and Computing (Vol. 842, pp. 1121–1128). Springer Verlag. https://doi.org/10.1007/978-3-319-98776-7_137

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free