An ID-based cryptographic mechanisms based on GDLP and IFP

被引:28
作者
Meshram, Chandrashekhar [1 ]
Meshram, Suchitra A. [2 ]
Zhang, Mingwu [3 ]
机构
[1] Shri Shankaracharya Engn Coll, Dept Appl Math, Bhilai, CG, India
[2] RTM Nagpur Univ, Dept Math, Nagpur, MS, India
[3] Kyushu Univ, Inst Math Ind, Fukuoka 812, Japan
关键词
Cryptography; Public key cryptosystem; Identity-based cryptosystem; Discrete logarithm problem; Generalized discrete logarithm problem; Integer factorization problem (IFP); IDENTITY-BASED CRYPTOSYSTEMS; PUBLIC-KEY CRYPTOSYSTEM; DISCRETE LOGARITHMS; ENCRYPTION; IDENTIFICATION; SECURITY;
D O I
10.1016/j.ipl.2012.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the identity of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity-based cryptosystem, but only in constructing an identity-based signature scheme. In this paper, we propose an ID-based cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:753 / 758
页数:6
相关论文
共 25 条
  • [1] Blorn R., 1984, P EUR 84 PANS FRANC, P335
  • [2] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [3] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [4] Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]
  • [5] COPPERSMITH D, 1987, COMMUNICATION
  • [6] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [7] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [8] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [9] STRONG RSA KEYS
    GORDON, J
    [J]. ELECTRONICS LETTERS, 1984, 20 (12) : 514 - 516
  • [10] PUBLIC-KEY CRYPTOSYSTEM DESIGN BASED ON FACTORING AND DISCRETE LOGARITHMS
    HARN, L
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (03): : 193 - 195