Cryptanalysis of Jain-Singh’s identity-based RSA encryption

ABSTRACT Identity-based Encryption (IBE) solves the problem of requiring key certificates in Public Key Encryption (PKE) by replacing the public key with the user’s identity. However, most IBE systems depend on Elliptic Curve Cryptography (ECC) which makes them time inefficient. Since Adi Shamir presented the idea of IBE, designing an IBE using an efficient encryption algorithm such as RSA still remains an open challenge. In 2017, Jain and Singh presented an identity-based variant of RSA. They claimed that their system is secure without any more computational overhead. In this paper, we analyze the security of Jain Singh’s identity-based RSA encryption. We launch two attacks against their system and prove that their system is not secure.

[1]  Dániel Marx,et al.  On the Optimality of Planar and Geometric Approximation Schemes , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[2]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[3]  Gene Tsudik,et al.  Simple Identity-Based Cryptography with Mediated RSA , 2003, CT-RSA.

[4]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[5]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[6]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[7]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[8]  Nico Döttling,et al.  New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes , 2018, Public Key Cryptography.

[9]  Lishan Ke,et al.  New efficient identity based encryption without pairings , 2019, J. Ambient Intell. Humaniz. Comput..

[10]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[11]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[12]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[13]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[14]  Meenal Jain,et al.  Identity Based Secure RSA Encryption System , 2017 .

[15]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.