Identity Based Secure RSA Encryption System

Identity Based Encryption (IBE) has emerged as a solution to the problem of trust in public keys of Public Key Cryptography (PKC) systems where most of the proposed IBE schemes are based on bilinear pairing and Elliptic Curve Cryptography. The heavy computations involved in such schemes make pairing based schemes less practical. Efficient non-pairing schemes have been designed over the famous RSA structure to bridge the practical gap between actual public key ciphers and utility of IBE in it. Yet the security threats to RSA have been retained in such proposals. This paper presents an RSA based IBE scheme which overcomes the security problems of RSA and has linear computations involved and makes key management/revocation easy.

[1]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[2]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[3]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[4]  Yi Mu,et al.  Identity-Based Mediated RSA Revisited , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Ibrahim F. Elashry Pairing-free identity-based cryptography , 2015 .

[6]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Minghui Zheng,et al.  An Improved Identity-Based Encryption Scheme Without Bilinear Map , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[9]  Craig Gentry,et al.  Space-Efficient Identity Based EncryptionWithout Pairings , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Yi Mu,et al.  An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing , 2014, WISA.

[13]  Gerhard Frey,et al.  The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.

[14]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[15]  Gene Tsudik,et al.  Simple Identity-Based Cryptography with Mediated RSA , 2003, CT-RSA.

[16]  Mahabir Prasad Jhanwar,et al.  A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme , 2009, Inscrypt.