An ID-based Beta Cryptosystem using Generalized Discrete Logarithm Problem and Integer Factorization Problem

被引:0
|
作者
Meshram, Chandrashekhar [1 ]
Meshram, S. A. [2 ]
Gupta, Deepak [3 ]
机构
[1] Shri Shankaracharya Engn Coll, Dept Appl Math, Bhilai, CG, India
[2] RTM Nagpur Univ, Dept Math, Nagpur, Maharashtra, India
[3] Black Diamond Coll Engn & Technol, Dept Comp Sci, Jharhsuguda, Orissa, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2012年 / 7卷 / 05期
关键词
Public key Cryptosystem; Identity based Cryptosystem; Discrete Logarithm Problem (DLP); Generalized Discrete Logarithm Problem (GDLP); Beta Cryptosystem and Integer Factorization Problem (IFP);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a modern open network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by Shamir [1], and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. This paper proposes an ID-based beta cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem, which is one of the earliest realizations in Shamir's sense. Furthermore, we consider the security against a conspiracy of some users in the proposed system, and show the possibility of establishing a more secure system.
引用
收藏
页码:275 / 283
页数:9
相关论文
共 50 条
  • [31] Solving the Discrete Logarithm Problem Using P systems
    Ma Xiaojing
    Li Zhitang
    Tu Hao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 438 - +
  • [32] Discrete logarithm problem using index calculus method
    Padmavathy, R.
    Bhagvati, Chakravarthy
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 161 - 169
  • [33] Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP
    Meshram, Chandrashekhar
    Meshram, S. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (08) : 25 - 29
  • [34] ANALYSIS ON A GENERALIZED ALGORITHM FOR THE STRONG DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS
    Kim, Minkyu
    Cheon, Jung Hee
    Lee, In-Sok
    MATHEMATICS OF COMPUTATION, 2014, 83 (288) : 1993 - 2004
  • [35] CRYPTANALYSIS OF THE BLIND SIGNATURES BASED ON THE DISCRETE LOGARITHM PROBLEM
    HORSTER, P
    MICHELS, M
    PETERSEN, H
    ELECTRONICS LETTERS, 1995, 31 (21) : 1827 - 1827
  • [36] A DIRECTED SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM PROBLEM
    Ismail, Eddie Shahril
    Abu Hasan, Yahya
    JURNAL TEKNOLOGI, 2007, 47
  • [37] CRYPTANALYSIS OF THE BLIND SIGNATURES BASED ON THE DISCRETE LOGARITHM PROBLEM
    HARN, L
    ELECTRONICS LETTERS, 1995, 31 (14) : 1136 - 1136
  • [38] ID-based Multi-signer Universal Designated Multi-verifier Signature Based on Discrete Logarithm
    Deng, Lunzhi
    Zeng, Jiwen
    Huang, Huawei
    CHIANG MAI JOURNAL OF SCIENCE, 2018, 45 (01): : 617 - 624
  • [39] Accelerating Iterative SpMV for the Discrete Logarithm Problem Using GPUs
    Jeljeli, Hamza
    ARITHMETIC OF FINITE FIELDS (WAIFI 2014), 2015, 9061 : 25 - 44
  • [40] Using Equivalent Class to Solve Interval Discrete Logarithm Problem
    Qi, Bin
    Ma, Jie
    Lv, Kewei
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 397 - 412