Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
From MaRDI portal
Publication:5069964
DOI10.1080/09720529.2015.1032621zbMath1495.94063OpenAlexW2768511680MaRDI QIDQ5069964
Suchitra A. Meshram, Chandrashekhar Meshram
Publication date: 19 April 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2015.1032621
discrete logarithm problempublic key cryptosysteminteger factorization problemidentity-based cryptosystemgeneralized discrete logarithm problem
Related Items (5)
An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ EMD and GNN-adaboost fault diagnosis for urban rail train rolling bearings ⋮ An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment ⋮ A new multiparty identification scheme based on nearring root extraction problem
Cites Work
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Security proofs for identity-based identification and signature schemes
- On the security of efficient user identification scheme
- Identity-Based Cryptosystems and Signature Schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Public-key cryptosystem design based on factoring and discrete logarithms
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Hiding information and signatures in trapdoor knapsacks
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem