IJPAM: Volume 81, No. 5 (2012)


Chandrashekhar Meshram$^1$, Xiaopeng Huang$^2$, S.A. Meshram$^3$
$^1$Department of Applied Mathematics
Shri Shankaracharya Engineering College
Junwani, Bhilai (C.G.), INDIA
$^2$Department of Electrical and Computer Engineering
Stevens Institute of Technology Hoboken
New Jersey 07030, USA
$^3$Department of Mathematics
R.T.M. Nagpur University
Nagpur (M.S.), INDIA

Abstract. In 1984, Shamir proposed the concept of the identity-based cryptosystem. Instead of generating and publishing a public key for each user, the identity-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct.This paper proposes a new identity-based cryptographic scheme for implementing public-key cryptosystem based on quadratic exponentiation randomized cryptosystem.The major advantage of the identity-based cryptosystem based on our scheme over other published identity-based cryptosystems is that the number of users can be extended to $b*L$ users without degrading the system's security even when users cospire, where $L$ is the number of the system's secrets and $b$ is the number of factors in $N-1$.

Received: July 9, 2012

AMS Subject Classification: 94A60, 81P94, 86P24

Key Words and Phrases: public key cryptosystem (PKC), identity based cryptosystem, discrete logarithm problem (DLP), generalized discrete logarithm problem (GDLP), integer factorization problem (IFP) and quadratic exponentiation randomized (QRC) cryptosystem

Download paper from here.

Source: International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
Year: 2012
Volume: 81
Issue: 5