An efficient ID‐based cryptographic technique using IFP and GDLP

[1]  Cheng-Chi Lee,et al.  An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem , 2018, Soft Comput..

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Md Whaiduzzaman,et al.  An Identity-Based Encryption Scheme for Data Security in Fog Computing , 2018, IJCCI.

[4]  Mingwu Zhang,et al.  An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..

[5]  Cheng-Chi Lee,et al.  A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..

[6]  Chandrashekhar Meshram,et al.  Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem , 2017 .

[7]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[8]  Chun-Ta Li,et al.  An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.

[9]  Cheng-Chi Lee,et al.  OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network , 2020, IEEE Access.

[10]  Liaojun Pang,et al.  nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness , 2013, Comput. Informatics.

[11]  Mohammad S. Obaidat,et al.  An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).

[12]  Cheng-Chi Lee,et al.  A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing , 2020, Int. J. Commun. Syst..

[13]  Fagen Li,et al.  IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks , 2019, Mobile Networks and Applications.

[14]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[15]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[16]  Cheng-Chi Lee,et al.  Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs , 2018, IET Networks.

[17]  Chandrashekhar Meshram,et al.  An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..

[18]  Chandrashekhar Meshram,et al.  An identity based beta cryptosystem , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[19]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[20]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[21]  Cheng-Chi Lee,et al.  An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP , 2017, Informatica.

[22]  Cheng-Chi Lee,et al.  An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..

[23]  Chandrashekhar Meshram,et al.  An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..