An ID-based Beta Cryptosystem using Generalized Discrete Logarithm Problem and Integer Factorization Problem

被引:0
|
作者
Meshram, Chandrashekhar [1 ]
Meshram, S. A. [2 ]
Gupta, Deepak [3 ]
机构
[1] Shri Shankaracharya Engn Coll, Dept Appl Math, Bhilai, CG, India
[2] RTM Nagpur Univ, Dept Math, Nagpur, Maharashtra, India
[3] Black Diamond Coll Engn & Technol, Dept Comp Sci, Jharhsuguda, Orissa, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2012年 / 7卷 / 05期
关键词
Public key Cryptosystem; Identity based Cryptosystem; Discrete Logarithm Problem (DLP); Generalized Discrete Logarithm Problem (GDLP); Beta Cryptosystem and Integer Factorization Problem (IFP);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a modern open network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by Shamir [1], and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. This paper proposes an ID-based beta cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem, which is one of the earliest realizations in Shamir's sense. Furthermore, we consider the security against a conspiracy of some users in the proposed system, and show the possibility of establishing a more secure system.
引用
收藏
页码:275 / 283
页数:9
相关论文
共 50 条
  • [21] A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem of N = p(2)q
    Ariffin, M. R. K.
    Asbullah, M. A.
    Abu, N. A.
    Mahad, Z.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2013, 7 : 19 - 37
  • [22] RESTRUCTURING OF DISCRETE LOGARITHM PROBLEM AND ELGAMAL CRYPTOSYSTEM BY USING THE POWER FIBONACCI SEQUENCE MODULE M
    Ozyilmaz, Cagla
    Nalli, Ayse
    JOURNAL OF SCIENCE AND ARTS, 2019, (01): : 61 - 70
  • [23] Deniable authentication protocol based on integer factorization and discrete logarithm problems
    Kar, Jayaprakash
    ICIC Express Letters, 2013, 7 (07): : 2061 - 2067
  • [24] Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 347 - 367
  • [25] The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem
    Blackburn, Simon R.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 193 - 198
  • [26] The generalized Weil pairing and the discrete logarithm problem on elliptic curves
    Garefalakis, T
    LATIN 2002: THEORETICAL INFORMATICS, 2002, 2286 : 118 - 130
  • [27] The generalized Weil pairing and the discrete logarithm problem on elliptic curves
    Garefalakis, T
    THEORETICAL COMPUTER SCIENCE, 2004, 321 (01) : 59 - 72
  • [28] A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems
    Duran Diaz, R.
    Hernandez Encinas, L.
    Munoz Masque, J.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 143 - 150
  • [29] A BLIND SIGNATURE BASED ON DISCRETE LOGARITHM PROBLEM
    Shen, Victor R. L.
    Chung, Yu Fang
    Chen, Tzer Shyong
    Lin, Yu An
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5403 - 5416
  • [30] THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM
    Darapureddi, Avinash
    Mohandas, Radhesh
    Pais, Alwyn R.
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 263 - 269