An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
From MaRDI portal
Publication:477687
DOI10.1016/j.ipl.2014.10.007zbMath1320.94075OpenAlexW2042683115WikidataQ122947819 ScholiaQ122947819MaRDI QIDQ477687
Publication date: 9 December 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.10.007
cryptographydiscrete logarithm problemidentity-based encryptioninteger factorization problemrandom oracle
Related Items (7)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem ⋮ Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem ⋮ Breaking an ID-based encryption based on discrete logarithm and factorization problems ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment ⋮ A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data
Cites Work
- Unnamed Item
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Identity-Based Cryptosystems and Signature Schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem