Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle

In this study, we propose a new ID-based beta cryptosystem scheme secure under selective identity adaptive chosen ciphertext security (IND-sID-CCA) under assumption in the random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational cost and the length of public key.

[1]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[2]  Chandrashekhar Meshram,et al.  An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..

[3]  Yevgeniy Vahlis,et al.  CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.

[4]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[5]  Cheng-Chi Lee,et al.  An IBE Technique Using Partial Discrete Logarithm , 2016 .

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Mingwu Zhang,et al.  An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..

[8]  Feng Wang,et al.  Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Chandrashekhar Meshram,et al.  An identity based beta cryptosystem , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[11]  Mohammad S. Obaidat,et al.  An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).

[12]  Jayaprakash Kar Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles , 2015, Int. J. Netw. Secur..

[13]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.

[14]  Chandrashekhar Meshram,et al.  An efficient ID-based Beta Cryptosystem , 2015 .

[15]  Chandrashekhar Meshram,et al.  NEW IDENTITY-BASED CRYPTOGRAPHIC SCHEME FOR IFP AND DLP BASED CRYPTOSYSTEM , 2012 .

[16]  Wei-Bin Lee,et al.  Constructing identity-based cryptosystems for discrete logarithm based cryptosystems , 2004, J. Netw. Comput. Appl..

[17]  Chandrashekhar Meshram,et al.  Factoring and Discrete Logarithm using IBC , 2015 .

[18]  Chandrashekhar Meshram,et al.  An efficient identity-based QER cryptographic scheme , 2016 .

[19]  Chandrashekhar Meshram,et al.  An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..

[20]  Bazara I. A. Barry,et al.  A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model , 2017, Int. J. Netw. Secur..

[21]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[22]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.