Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP

被引:0
作者
Meshram, Chandrashekhar [1 ]
Meshram, S. A. [2 ]
机构
[1] Shri Shankaracharya Engn Coll, Dept Appl Math, Bhilai, CG, India
[2] RTM Nagpur Univ, Dept Math, Nagpur, Maharashtra, India
关键词
Public key Cryptosystem; Identity based Cryptosystem; Discrete Logarithm Problem (DLP); Double Discrete Logarithm Problem (DDLP); Integer Factorization Problem (IFP);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the "identity" of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme. Meshram and Agrawal [5] have proposed an id - based cryptosystem based on integer factoring and double discrete logarithm problem which uses the public key cryptosystem based on integer factoring and double discrete logarithm problem. In this paper, we propose the modification in an id based cryptosystem based on the integer factoring and double discrete logarithm problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
引用
收藏
页码:25 / 29
页数:5
相关论文
共 24 条
  • [1] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [2] Blom R., 1984, LECT NOTES COMPUTER, P335
  • [3] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [4] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [5] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [6] ElGmal T., 1995, IEEE T INFORM THEORY, V31, P469
  • [7] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [8] An efficient user identification scheme based on ID-based cryptosystem
    Hwang, MS
    Lo, JW
    Lin, SC
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (06) : 565 - 569
  • [9] Kiltz E, 2008, LECT NOTES COMPUT SC, V4964, P221, DOI 10.1007/978-3-540-79263-5_14
  • [10] Kohnfelder L., 1978, METHOD CERTIFICATION