An ID-based Beta Cryptosystem using Generalized Discrete Logarithm Problem and Integer Factorization Problem

被引:0
作者
Meshram, Chandrashekhar [1 ]
Meshram, S. A. [2 ]
Gupta, Deepak [3 ]
机构
[1] Shri Shankaracharya Engn Coll, Dept Appl Math, Bhilai, CG, India
[2] RTM Nagpur Univ, Dept Math, Nagpur, Maharashtra, India
[3] Black Diamond Coll Engn & Technol, Dept Comp Sci, Jharhsuguda, Orissa, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2012年 / 7卷 / 05期
关键词
Public key Cryptosystem; Identity based Cryptosystem; Discrete Logarithm Problem (DLP); Generalized Discrete Logarithm Problem (GDLP); Beta Cryptosystem and Integer Factorization Problem (IFP);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a modern open network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by Shamir [1], and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. This paper proposes an ID-based beta cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem, which is one of the earliest realizations in Shamir's sense. Furthermore, we consider the security against a conspiracy of some users in the proposed system, and show the possibility of establishing a more secure system.
引用
收藏
页码:275 / 283
页数:9
相关论文
共 35 条
  • [1] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [2] Blom R., 1982, P CRYPT 82
  • [3] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [4] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [5] Cocks Clifford, 2001, CRYPTOGRAPHY CODING, V2260, P360, DOI DOI 10.1007/3-540-45325-3
  • [6] COPPERSMITH D, 1987, COMMUNICATION
  • [7] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [8] ElGmal T., 1995, IEEE T INFORM THEORY, V31, P469
  • [9] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [10] STRONG RSA KEYS
    GORDON, J
    [J]. ELECTRONICS LETTERS, 1984, 20 (12) : 514 - 516