An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
From MaRDI portal
Publication:396599
DOI10.1016/J.IPL.2013.02.009zbMATH Open1358.94071OpenAlexW2071869656MaRDI QIDQ396599FDOQ396599
Authors: Chandrashekhar Meshram, Suchitra A. Meshram
Publication date: 13 August 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2013.02.009
Recommendations
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- scientific article; zbMATH DE number 4057441
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Constructing identity-based cryptographic scheme for beta cryptosystem
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
cryptographypublic key cryptosystemdiscrete logarithm (DL)identity-based cryptosysteminteger factorization (IF)
Cites Work
- Identity-based cryptosystems and signature schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Title not available (Why is that?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Title not available (Why is that?)
- Security proofs for identity-based identification and signature schemes
- A cryptosystem based on double generalized discrete logarithm problem
- Title not available (Why is that?)
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Efficient identification and signature schemes
Cited In (15)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
- Improvement on Meshram et al.'s ID-based cryptographic mechanism
- Title not available (Why is that?)
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
- Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
- Breaking an ID-based encryption based on discrete logarithm and factorization problems
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes
- Title not available (Why is that?)
- Constructing identity-based cryptographic scheme for beta cryptosystem
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
This page was built for publication: An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q396599)