Cryptographic identification of users based on inter-mixed approach

Pin Chang Su*, Erl Huei Lu, Henry Ker Chang Chang

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

2 Scopus citations

Abstract

This study presents three identity-based cryptographic schemes, based on two-known assumptions. Most existing cryptosystem designs incorporate just one cryptographic assumption, such as factoring or discrete logarithms. These assumptions appear secure today; but, it is possible that efficient algorithms will be developed in the future to break one or more of these assumptions. The security of the proposed scheme follows from the difficulties in simultaneously solving the factoring (FAC) and discrete logarithms (DL) problems with arithmetic modulo of almost the same size. Each user in the system uses common arithmetic modulo and only requires one public key and one private key. The proposed schemes support user identification, digital signature, and key distribution.

Original languageEnglish
Pages (from-to)77-85
Number of pages9
JournalChung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology
Volume33
Issue number1
StatePublished - 11 2004

Keywords

  • Digital signature
  • Discrete logarithms
  • Factoring
  • Id-based
  • Key distribution

Fingerprint

Dive into the research topics of 'Cryptographic identification of users based on inter-mixed approach'. Together they form a unique fingerprint.

Cite this