In this paper, we shall propose several new identity-based information security functions, including an authenticated key distribution scheme, a cryptosystem, as well as a digital signature scheme. Their security analyses are based on the difficulty of solving factorization, discrete logarithms moduloing a composite numbers, and the Diffie-Hellman problem.
CRYPTOGRAPHY DIGITAL SIGNATURE INFORMATION THEORY KEY DISTRIBUTION