×

zbMATH — the first resource for mathematics

An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. (English) Zbl 1320.94075
Summary: ID-based encryption (identity-based) is a very useful tool in cryptography. It has many potential applications. The security of traditional ID-based encryption scheme wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned encryptions. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in ID-based encryption is an important problem. To deal with this problem, we propose to integrate forward security into ID-based encryption. In this paper, we propose a new construction of ID-based encryption scheme based on integer factorization problem and discrete logarithm problem is semantically secure against chosen plaintext attack (CPA) in random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational cost and the length of public key.

MSC:
94A60 Cryptography
11Y05 Factorization
11Y16 Number-theoretic algorithms; complexity
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Boneh, D.; Boyen, X., Secure identity based encryption without random oracles, (Advances in Cryptology, CRYPTO 2004, Lecture Notes in Computer Science, vol. 3152, (2004), Springer-Verlag Berlin), 443-459 · Zbl 1104.94019
[2] Boneh, D.; Boyen, X., Efficient selective-id secure identity based encryption without random oracles, (Advances in Cryptology, EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, (2004), Springer-Verlag Berlin), 223-238 · Zbl 1122.94355
[3] Boneh, D.; Franklin, M. K., Identity-based encryption from the Weil pairing, (Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, vol. 2193, (2001), Springer-Verlag Berlin), 213-229 · Zbl 1002.94023
[4] Boneh, D.; Franklin, M. K., Identity based encryption from the Weil pairing, SIAM J. Comput., 32, 3, 586-615, (2003) · Zbl 1046.94008
[5] Boneh, D.; Canetti, R.; Halevi, S.; Katz, J., Chosen-ciphertext security from identity-based encryption, SIAM J. Comput., 36, 5, 1301-1328, (2003) · Zbl 1138.94010
[6] Cocks, C., An identity based encryption scheme based on quadratic residues, (International Conference on Cryptography and Coding (Proceedings of IMA), Lecture Notes in Computer Science, vol. 2260, (2001), Springer-Verlag), 360-363 · Zbl 0999.94532
[7] ElGmal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory, 31, 469-472, (1995)
[8] Fujisaki, E.; Okamoto, T., Secure integration of asymmetric and symmetric encryption schemes, (Advances in Cryptology, Crypto’99, Lecture Notes in Computer Science, vol. 1666, (1999), Springer-Verlag Berlin), 537-554 · Zbl 0942.94019
[9] Galindo, D., The exact security of pairing based encryption and signature schemes, (November 1, 2004), Working Draft, available at
[10] Gangishetti, R.; Gorantla, M. C.; Das, M. L.; Saxena, A., Threshold key issuing in identity-based cryptosystems, Comput. Stand. Interfaces, 29, 260-264, (2007)
[11] Heng, S.; Kurosawa, K., K-resilient identity-based encryption in the standard model, (Topics in Cryptology, CT-RSA 2004, Lecture Notes in Computer Science, vol. 2964, (2004), Springer-Verlag Berlin), 67-80 · Zbl 1196.94056
[12] Heng, S.; Kurosawa, K., K-resilient identity-based encryption in the standard model, IEICE Trans. Fundam., E89CA, 1, 39-46, (2006)
[13] Kiltz, E.; Vahlis, Y., CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption, (CT-RSA, Lecture Notes in Computer Science, vol. 4964, (2008), Springer-Verlag), 221-239 · Zbl 1153.94400
[14] Lee, W. C.; Liao, K. C., Constructing identity-based cryptosystems for discrete logarithm based cryptosystems, J. Netw. Comput. Appl., 22, 191-199, (2004)
[15] Lynn, B., Authenticated ID-based encryption, cryptology, (2002), ePrint Archive, Report 2002/072
[16] Meshram, C.; Meshram, S.; Zhang, M., An ID-based cryptographic mechanisms based on GDLP and IFP, Inf. Process. Lett., 112, 19, 753-758, (2012) · Zbl 1250.94059
[17] Meshram, C.; Meshram, S., An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem, Inf. Process. Lett., 113, 10-11, 375-380, (2013) · Zbl 1358.94071
[18] Shamir, A., Identity-based cryptosystems and signature schemes, (Proceedings of CRYPTO’84, Lecture Notes in Computer Science, vol. 196, (1984), Springer-Verlag), 47-53 · Zbl 1359.94626
[19] Sun, J.; Zhang, C.; Zhang, Y.; Fang, Y., An identity-based security system for user privacy in vehicular ad hoc networks, IEEE Trans. Parallel Distrib. Syst., 27, 9, 1227-1239, (2010)
[20] Waters, B., Efficient identity-based encryption without random oracles, (Advances in Cryptology, CRYPTO 2005, Lecture Notes in Computer Science, vol. 3494, (2005), Springer-Verlag Berlin), 114-127 · Zbl 1137.94360
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.