On the conventional public key in identification-based encryption: The case of RSA

被引:0
|
作者
Aouinatou, Rkia [1 ]
Belkasmi, Mostafa [2 ]
机构
[1] Laboratoire de Recherche Informatique, Et Telecommunication (LRIT), Faculty of Sciences
[2] Departement Réseaux et Communication, ENSIAS, Mohammed V-Souissi University, Madinat Al Irfane, B.P. 713, Agdal-Rabat
关键词
Authentication; Classic; Computer; Conventional; Exponent; IBE; Information; OAEP; PKC; RSA; Security; Shamir; SIDCPA; Signature;
D O I
10.1504/IJICS.2013.055837
中图分类号
学科分类号
摘要
This paper rely on the traditional method RSA-OAEP with an identification-based encryption. Firstly, we make a little change in the basic idea (Boneh et al., 2002; Ding and Tsudik, 2003) in order to create a scheme with which we can sign and crypt at same time. A simple comparison prove that our signature is equivalent to the signature of Shamir. Then, we propose a new approach, which conserve properly the RSA classic. In this paper we will also respond to the question of Xuhua Ding and Gene Tsudik, to propose a convenient exponent for an RSA-IBE. © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:171 / 201
页数:30
相关论文
共 50 条
  • [1] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +
  • [2] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [3] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [4] An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
    Ye, Guodong
    Jiao, Kaixin
    Wu, Huishan
    Pan, Chen
    Huang, Xiaoling
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [5] Action-triggered public-key system for GSM using RSA with phone-dependent encryption
    El Nemr, Rehab K.
    Ismail, Imane Aly Saroit
    Ahmed, S. H.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 175 - +
  • [6] Public Key Perturbation of Randomized RSA Implementations
    Berzati, Alexandre
    Canovas-Dumas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 306 - +
  • [7] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [8] Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol
    Jeon, Seok Hee
    Gil, Sang Keun
    CURRENT OPTICS AND PHOTONICS, 2020, 4 (02) : 103 - 114
  • [9] Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm
    Meng, X. F.
    Peng, X.
    Cai, L. Z.
    Li, A. M.
    Gao, Z.
    Wang, Y. R.
    JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2009, 11 (08):
  • [10] On the Authentication of Certificateless RSA Public Key
    Yang, Wu-Chuan
    Ting, Lien-Yuan
    Kuo, Tzu-Chun
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 378 - 379