An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme

In this paper, we presented an ID-based Quadratic-Exponentiation Randomized (QER) Cryptosystem under the security assumptions of the discrete logarithm problem (DLP) and integer factorization problem (IFP). We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system. The obtained results show the special outcomes from the point view of security as we face the issue of solving IFP and DLP simultaneously in the multiplicative group of finite fields as compared to the other ID-based cryptographic scheme. Our proposed scheme requires a nominal operation in encryption and decryption algorithms, which makes it very effective and powerful.

[1]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[4]  Chandrashekhar Meshram,et al.  An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..

[5]  Eiji Okamoto,et al.  Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[8]  Chandrashekhar Meshram,et al.  An efficient ID-based Beta Cryptosystem , 2015 .

[9]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[10]  Mingwu Zhang,et al.  An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..

[11]  J. Gordon Strong RSA keys , 1984 .

[12]  Chandrashekhar Meshram,et al.  An identity based beta cryptosystem , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[13]  Chandrashekhar Meshram,et al.  An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..