16
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem

&
Pages 1121-1134 | Received 01 Nov 2014, Published online: 22 Nov 2017

References

  • A. Shamir, Identity-based cryptosystem and signature scheme, Advances in Cryptology: Proceedings of Crypto’ (Lecture Notes in Computer Science 196). Berlin, West Germany: Springer-Verlag, 84(1985), pp. 47–53.
  • A. Shamir, private communication, June 1988.
  • C. Meshram and S. Meshram, An identity based cryptographic model for discrete logarithm and integer factoring based cryptosystem, Information Processing Letters, 113 (10), (2013), pp. 375–380. doi: 10.1016/j.ipl.2013.02.009
  • C. Meshram, An Efficient ID-based Cryptographic Encryption based on Discrete Logarithm Problem and Integer Factorization Problem, Information Processing Letters, 115 (2) (2015), pp. 351–358. doi: 10.1016/j.ipl.2014.10.007
  • C Meshram, A Cryptosystem based on Double Generalized Discrete Logarithm Problem” Int. J. Contemp. Math. Sciences, 6(6) (2011), pp. 285–297.
  • C. Meshram, Modified ID-Based Public key Cryptosystem using Double Discrete Logarithm Problem, International Journal of Advanced Computer Science and Applications, 1(6)(2010), pp.30–34. doi: 10.14569/IJACSA.2010.010605
  • C. Meshram, Practical IBC using Hybrid-Mode Problems; Factoring and Discrete Logarithm, Bulletin of Electrical Engineering and Informatics, 4(1)(2015), pp.73–82. doi: 10.11591/eei.v4i1.326
  • C. Meshram, S. Meshram and C. Ram, Constructing identity-based cryptographic scheme for beta cryptosystem, International Journal of Applied Mathematics, 25(5), (2012), pp. 609–624.
  • C. Meshram, An efficient IBE scheme using IFP and DDLP, International Journal of Information Technology and Computer Science, 5 (6) (2013), pp. 65–72. doi: 10.5815/ijitcs.2013.06.09
  • C. Meshram, X. Huang and S. Meshram, Constructing Identity-based cryptographic scheme for QER cryptosystem, International Journal of Pure and Applied Mathematics, 81(5), (2012), pp.737–753.
  • C. Meshram, X. Huang and S. Meshram, New Identity-based cryptographic scheme for IFP and DLP based cryptosystem, International Journal of Pure and Applied Mathematics, 81(1)(2012), pp. 65–79.
  • C. Meshram and S. Meshram, An Identity based Beta Cryptosystem, IEEE Proceedings of 7th International Conference on Information Assurance and Security (IAS 2011) Dec.5–8, (2011), pp.298–303.
  • C. Meshram, S. Meshram and M. Zhang, An ID-based cryptographic mechanisms based on GDLP and IFP, Information Processing Letters, 112 (19) (2012), pp.753–758. doi: 10.1016/j.ipl.2012.06.018
  • C. Meshram, Discrete Logarithm and Integer Factorization using ID-based Encryption, Bulletin of Electrical Engineering and Informatics, 4(2)(2015), pp.160–168.
  • D. Coppersmith, private communication, Nov. 1987.
  • D. Boneh, R. Canetti, S. Halevi, and J. Katz, Chosen-ciphertext security from identity-based encryption, SIAM Journal Computing, 36(5) (2007), pp.1301–1328. doi: 10.1137/S009753970544713X
  • E. Okarnoto and K. Tanaka, Key distribution system based on identification information, IEEE Jou. Selecr. Areas Commun., 7 (1989), pp.481–485 doi: 10.1109/49.17711
  • E. Ryu and K. Yoo, On the security of efficient user identification scheme, Applied Mathematics and Computation, 171(2005), pp. 1201–1205. doi: 10.1016/j.amc.2005.01.107
  • J. Gordon, Strong RSA keys, Electron. Lett.,20 (12) (1984), pp. 514–516. doi: 10.1049/el:19840357
  • L. Kohnfelder, A method for certification, Lab. Comput. Sci. Mass. Inst. Technol. Cambridge, MA, May (1978).
  • L. Harn, Public key cryptosystem design based on factoring and discrete logarithm, IEEE Pro. Comput. Digit. Tech, 141 (1994), pp.193–195. doi: 10.1049/ip-cdt:19941040
  • M. Bellare, C. Namprempreand G. Neven, Security Proofs for Identity-Based Identification and Signature Schemes, Journal of Cryptology, 22 (2009), pp. 1–61. doi: 10.1007/s00145-008-9028-8
  • R. Blorn, An optimal class of symmetric key generation systems. In Proc. Eurocryp. ‘84, Pans, France, (1984), Apr. 9–11, pp. 335–338.
  • R. Merkle and M. Hellman, Hiding information and signatures in trapdoor knapsacks, IEEE Trans. Inform. Theory, IT-24 (1978), pp. 525–530. doi: 10.1109/TIT.1978.1055927
  • S. Tsujii, J. Chao and K. Araki, A Simple ID-Based Scheme for Key Sharing, IEEE Jounral on Selected Area in Communication,11(1993), pp.730–734. doi: 10.1109/49.223874
  • S. Tsujii, and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Jounral on selected areas in communications, 7(1989), pp. 467–473.
  • T. ElGmal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, 31 (1995), pp 469–472. doi: 10.1109/TIT.1985.1057074
  • W. Diffie and M. Hellman, New direction in Cryptography, IEEE Trans. Inform. Theory, 22(1976), pp 644–654. doi: 10.1109/TIT.1976.1055638
  • W. Lee and K. Liao, Constructing identity-based cryptosystems for discrete logarithm based cryptosystems, Journal of Network and Computer Applications, 27 (2004), pp. 191–199. doi: 10.1016/j.jnca.2004.03.001

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.