On the conventional public key in identification-based encryption: The case of RSA

被引:0
|
作者
Aouinatou, Rkia [1 ]
Belkasmi, Mostafa [2 ]
机构
[1] Laboratoire de Recherche Informatique, Et Telecommunication (LRIT), Faculty of Sciences
[2] Departement Réseaux et Communication, ENSIAS, Mohammed V-Souissi University, Madinat Al Irfane, B.P. 713, Agdal-Rabat
关键词
Authentication; Classic; Computer; Conventional; Exponent; IBE; Information; OAEP; PKC; RSA; Security; Shamir; SIDCPA; Signature;
D O I
10.1504/IJICS.2013.055837
中图分类号
学科分类号
摘要
This paper rely on the traditional method RSA-OAEP with an identification-based encryption. Firstly, we make a little change in the basic idea (Boneh et al., 2002; Ding and Tsudik, 2003) in order to create a scheme with which we can sign and crypt at same time. A simple comparison prove that our signature is equivalent to the signature of Shamir. Then, we propose a new approach, which conserve properly the RSA classic. In this paper we will also respond to the question of Xuhua Ding and Gene Tsudik, to propose a convenient exponent for an RSA-IBE. © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:171 / 201
页数:30
相关论文
共 50 条
  • [21] Hedging Public-Key Encryption in the Real World
    Boldyreva, Alexandra
    Patton, Christopher
    Shrimpton, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 462 - 494
  • [22] Parallel RSA encryption based on tree architecture
    Damrudi, Masumeh
    Ithnin, Norafida
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2013, 36 (05) : 658 - 666
  • [23] RSA Encryption/Decryption Implementation Based on Zedboard
    Bai, Xu
    Jiang, Lei
    Liu, Xinxing
    Tan, Jianlong
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 114 - 121
  • [24] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [25] SoK: Public Key Encryption with Openings
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 35 - 68
  • [26] A Posteriori Openable Public Key Encryption
    Bultel, Xavier
    Lafourcade, Pascal
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 17 - 31
  • [27] Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
    Ning, H.
    Liu, H.
    Mao, J.
    Zhang, Y.
    IET COMMUNICATIONS, 2011, 5 (12) : 1755 - 1768
  • [28] Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices
    Kollipara V.N.H.
    Kalakota S.K.
    Chamarthi S.
    Ramani S.
    Malik P.
    Karuppiah M.
    Journal of Cyber Security and Mobility, 2023, 12 (01): : 77 - 102
  • [29] Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search
    Bauspiess, Pia
    Kolberg, Jascha
    Drozdowski, Pawel
    Rathgeb, Christian
    Busch, Christoph
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6972 - 6981
  • [30] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):