Identity Based Cryptography

Sarvesh Tanwar, Anil Kumar
{"title":"Identity Based Cryptography","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.17010/IJCS/2017/V2/I4/117850","DOIUrl":null,"url":null,"abstract":"Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal in Computer Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17010/IJCS/2017/V2/I4/117850","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于身份的密码
数据安全是当今主要关注的问题之一。数字签名是保证消息的身份验证、不完整性和不可否认性的重要组成部分。数字签名可以使用RSA (Rives, Shamir, and Adleman)和椭圆曲线密码术来计算。它可以是一个简单的签名,其中使用发送方的私钥对消息的哈希进行加密。该私钥和相应的公钥由CA (Certificate Authority)生成,公钥绑定在数字证书中。另一种方法是基于身份的(Identity Based, ID)签名,其中私钥由私钥生成器(private Key Generator, PKG)生成,公钥由用户的身份派生[19]。这也被称为无证书通信。在基于ID的签名中,不需要在不安全的通道上传输公钥。公钥可以有效地从接收者的身份信息(如姓名、电子邮件地址、网络地址、IP地址和Aadhar号码)中获得。未经授权的用户可以伪造电子邮件地址。今天,Aadhar号码被用作唯一的身份证明,可以作为ID来派生用户的公钥。但是基于ID的密码学有一个固有的密钥托管,因为它依赖于使用单个主密钥生成用户私钥的PKG。密钥托管使PKG能够解密其域的所有消息。本文基于Shamir和Lein Harn的基于身份的签名,提出了一种安全高效的多重签名方案,该方案可以防止伪造和公钥替换攻击,并对公钥基础设施(PKI)和基于ID的加密进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assistance in Making Form Design and Recording Medical Records for Toddlers at Posyandu Kutilang, Sukowiyono Village, Kec. Padas, Ngawi Regency The 6 Steps of Handwashing Education The Partnership Model for Women Farmers by Processing Mangosteen Skin Waste as a Functional Food Substitute Socialization Of Clean And Healthy Living Behaviors And Screening Of Non-Communicable Diseases In Efforts To Prevent The Pandemic Covid-19 Community Empowerment Based on Local Potentials Through the Creation of “Cassava Nugget” Products in Dukuh Binangun, Werdi Village, Paninggaran District
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1