An identity based beta cryptosystem

In a modern open network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by Shamir [1], and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. This paper proposes an ID-based beta cryptosystem under the security assumptions of the generalized discrete logarithm problem and integer factorization problem, which is one of the earliest realizations in Shamir's sense. Furthermore, we consider the security against a conspiracy of some users in the proposed system, and show the possibility of establishing a more secure system.

[1]  L. Public-key cryptosystem design based on factoring and discrete logarithms , 2009 .

[2]  U. Maurer,et al.  A non-interactive public-key distribution system , 1996 .

[3]  Chandrashekhar Meshram,et al.  A Cryptosystem based on Double Generalized Discrete Logarithm Problem , 2011 .

[4]  J. Gordon Strong RSA keys , 1984 .

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Chandrashekhar Meshram Modified ID-Based Public Key Cryptosystem Using Double Discrete Logarithm Problem , 2011 .

[9]  Ashutosh Saxena,et al.  Threshold key issuing in identity-based cryptosystems , 2007, Comput. Stand. Interfaces.

[10]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[11]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[12]  Ueli Maurer,et al.  Non-interactive Public-Key Cryptography , 1991, EUROCRYPT.

[13]  L. Harn Public-key cryptosystem design based on factoring and discrete logarithms , 1994 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[16]  Min-Shiang Hwang,et al.  An improvement of an efficient user identification scheme based on ID-based cryptosystem , 2004, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[17]  Wei-Bin Lee,et al.  Constructing identity-based cryptosystems for discrete logarithm based cryptosystems , 2004, J. Netw. Comput. Appl..

[18]  Eiji Okamoto,et al.  Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..

[19]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[20]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[21]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.

[22]  Jinn-ke Jan,et al.  ID-based cryptographic schemes using a non-interactive public-key distribution system , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[23]  Yevgeniy Vahlis,et al.  CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.

[24]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[25]  Eun-Kyung Ryu,et al.  On the security of efficient user identification scheme , 2005, Appl. Math. Comput..

[26]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[27]  Jinhui Chao,et al.  A Simple ID-Based Scheme for Key Sharing , 1993, IEEE J. Sel. Areas Commun..