An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem

被引:35
作者
Meshram, Chandrashekhar [1 ]
机构
[1] RTM Nagpur Univ, Dept Math, Nagpur, Maharashtra, India
关键词
Cryptography; Identity-based encryption; Integer factorization problem; Discrete logarithm problem; Random oracle; IDENTITY-BASED ENCRYPTION; MODEL;
D O I
10.1016/j.ipl.2014.10.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based encryption (identity-based) is a very useful tool in cryptography. It has many potential applications. The security of traditional ID-based encryption scheme wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned encryptions. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in ID-based encryption is an important problem. To deal with this problem, we propose to integrate forward security into ID-based encryption. In this paper, we propose a new construction of ID-based encryption scheme based on integer factorization problem and discrete logarithm problem is semantically secure against chosen plaintext attack (CPA) in random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational cost and the length of public key. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:351 / 358
页数:8
相关论文
共 19 条
[1]  
[Anonymous], SIAM J COMPUT
[2]  
[Anonymous], IEEE T INF THEORY
[3]  
[Anonymous], 2002072 CRYPT EPRINT
[4]  
[Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_34
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3152, P443
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Cocks C., 2001, Cryptography and Coding, Lecture Notes in Computer Science, V2260, P360, DOI [DOI 10.1007/3-540-45325-3, 10.1007/3-540-45325-332]
[9]  
Galindo D., 2004, EXACT SECURITY PAIRI
[10]   Threshold key issuing in identity-based cryptosystems [J].
Gangishetti, Raju ;
Gorantla, M. Choudary ;
Das, Manik Lal ;
Saxena, Ashutosh .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :260-264