On the conventional public key in identification-based encryption: The case of RSA

被引:0
|
作者
Aouinatou, Rkia [1 ]
Belkasmi, Mostafa [2 ]
机构
[1] Laboratoire de Recherche Informatique, Et Telecommunication (LRIT), Faculty of Sciences
[2] Departement Réseaux et Communication, ENSIAS, Mohammed V-Souissi University, Madinat Al Irfane, B.P. 713, Agdal-Rabat
关键词
Authentication; Classic; Computer; Conventional; Exponent; IBE; Information; OAEP; PKC; RSA; Security; Shamir; SIDCPA; Signature;
D O I
10.1504/IJICS.2013.055837
中图分类号
学科分类号
摘要
This paper rely on the traditional method RSA-OAEP with an identification-based encryption. Firstly, we make a little change in the basic idea (Boneh et al., 2002; Ding and Tsudik, 2003) in order to create a scheme with which we can sign and crypt at same time. A simple comparison prove that our signature is equivalent to the signature of Shamir. Then, we propose a new approach, which conserve properly the RSA classic. In this paper we will also respond to the question of Xuhua Ding and Gene Tsudik, to propose a convenient exponent for an RSA-IBE. © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:171 / 201
页数:30
相关论文
共 50 条
  • [31] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [32] An Enhanced Parallel Version of RSA Public Key Crypto Based Algorithm Using OpenMP
    Saxena, Rahul
    Jain, Monika
    Singh, Dushyant
    Kushwah, Ashutosh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 37 - 42
  • [33] Analysis of Encryption Algorithms (RSA, SRNN and 2 key pair) for Information Security
    Bonde, Sarika Y.
    Bhadade, U. S.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [34] Meteosat Images Encryption based on AES and RSA Algorithms Meteosat Image Encryption
    Belkaid, Boukhatem Mohammed
    Mourad, Lahdir
    Mehdi, Cherifi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 203 - 208
  • [35] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [36] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [37] IWT and RSA based asymmetric image encryption algorithm
    Du, Simin
    Ye, Guodong
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 66 : 979 - 991
  • [38] On the Fog of RSA Key Lengths Verifying Public Key Cryptography Strength Recommendations
    Kiviharju, Mikko
    2017 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2017,
  • [39] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)
  • [40] A New Public Key Encryption with Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Li, Wangyu
    Sun, Hung-Min
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 550 - 557