Identity Based Secure RSA Encryption System

被引:1
作者
Jain, Meenal [1 ]
Singh, Manoj [1 ]
机构
[1] Gurukul Inst Engn & Technol, Kota, Rajasthan, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS | 2017年 / 508卷
关键词
Security; Public key cryptography; Identity based encryption; Non-pairing based IBE; Mediated RSA; RANDOM ORACLES; CRYPTOSYSTEMS;
D O I
10.1007/978-981-10-2750-5_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identity Based Encryption (IBE) has emerged as a solution to the problem of trust in public keys of Public Key Cryptography (PKC) systems where most of the proposed IBE schemes are based on bilinear pairing and Elliptic Curve Cryptography. The heavy computations involved in such schemes make pairing based schemes less practical. Efficient non-pairing schemes have been designed over the famous RSA structure to bridge the practical gap between actual public key ciphers and utility of IBE in it. Yet the security threats to RSA have been retained in such proposals. This paper presents an RSA based IBE scheme which overcomes the security problems of RSA and has linear computations involved and makes key management/revocation easy.
引用
收藏
页码:429 / 437
页数:9
相关论文
共 17 条
[1]  
[Anonymous], 2004, LNCS
[2]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[3]  
Boneh D., 2002, 3 WORKSH INF SEC APP
[4]  
Boneh D, 2007, ANN IEEE SYMP FOUND, P647, DOI 10.1109/FOCS.2007.50
[5]  
Ding X., 2003, LNCS, V2612
[6]  
Elashry I., 2015, THESIS
[7]  
Elashry I. F., 2014, LNCS, P257
[8]   Identity-based Mediated RSA Revisited [J].
Elashry, Ibrahim ;
Mu, Yi ;
Susilo, Willy .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :728-735
[9]  
ELGAMAL T, 1985, IEEE T INFORM THEORY, V31
[10]   The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems [J].
Frey, G ;
Müller, M ;
Rück, HG .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (05) :1717-1719