Abstract
This paper proposes several public key systems which security is based on the tamperfreeness of a device instead of the computational complexity of a trap door one-way function. The first identity-based cryptosystem to protect privacy is presented.
This research was done while the author was aangesteld navorser NFWO at the Katholieke Universiteit Leuven
Chapter PDF
Similar content being viewed by others
Keywords
- Secure Implementation
- Computational Hard Problem
- Encryption Device
- Decryption Device
- Conventional Cryptosystems
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y., Quisquater, JJ. (1987). Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?). In: Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science, vol 263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47721-7_9
Download citation
DOI: https://doi.org/10.1007/3-540-47721-7_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18047-0
Online ISBN: 978-3-540-47721-1
eBook Packages: Springer Book Archive