Identity Based Cryptography
DOI:
https://doi.org/10.17010/ijcs/2017/v2/i4/117850Keywords:
Aadhar Number
, Digital Certificate, Digital Signature Standard (DSS), Key Escrow, Private Key Generator (PKG)Manuscript received May 21
, 2017, revised July 13, accepted July 15, 2017. Date of publication August 6, 2017.Abstract
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.Downloads
Downloads
Published
How to Cite
Issue
Section
References
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Kilian, J. (eds) Advances in Cryptology - CRYPTO 2001. Lecture Notes in Comput. Sci., vol. 2139, Heidelberg : Springer, 2001, pp. 213–229. doi: 10.1007/3-540-44647-8_13
C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Biham, E. (ed.) EUROCRYPT 2003. Lecture Notes in Comput. Sci., vol. 2656, Heidelberg: Springer, 2003, pp. 272–293. doi: 10.1007/3-540-3920`0-9_17
S. S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography," in Laih, C.-S. (ed.) ASIACRYPT 2003. Lecture Notes in Comput. Sci., vol. 2894, Heidelberg: Springer, 2003, pp. 452–473. doi: : 10.1007/978-3-540-40061-5_29
A. M. Al-Khouri, "PKI in government digital identity Manage. system," Eur. J. of ePractice, vol. 4, pp. 4-21, 2012.
C. Youngblood, “An introduction to identity-based cryptography,†CSEP 590TU, 2005.
Ai-fen et al., "Separable and anonymous identity-based key issuing without secure channel," Cryptology ePrint Archive, Rep.2004/322, 2004. doi: 10.1007/11593980_22
L. Chen, K. Harrison, D. Soldera, and N. P. Smart, "Appl. of multiple trust authorities in pairing based cryptoSyst.," in G. I. Davida, Y. Frankel, and O. Rees Eds. Infrastructure Soc., 2002. Lecture Notes in Comput. Sci., vol. 2437, Heidelberg: Springer, 2002, pp. 260–275.
A. R. Sattam and P. Kenneth, “Certificateless public key cryptography a full versionâ€, in Asiacrypt’03, Lecture Notes in Comput. Sci. 2894, vol. 20, no. 4, Heidelberg: Springer, pp. 452-473, 2003.
L. Harn and J. Ren. "Efficient identity-based RSA multisignatures," Comput. & Security, vol. 27, no. 1, 2008, pp. 12-15. doi: https://doi.org/10.1016/j.cose.2008.03.003
A. Jancic and M. J. Warren, “PKI-Advantages and obstaclesâ€, in Proc. 2nd Australian Inform. Security Manage. Conf.: securing the future, Edith Cowan University, Perth, WA, 2004, pp. 1-9.
Z. Cheng, R. Comley, and L. Vasiu, "Remove key escrow from the identity-based encryption system," Found. of inform. technol. in the era of network and mobile computing, 2004.
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, "Secure key issuing in ID-based cryptography, in ACM 2nd Australasian Inform. Security Workshop, New Zealand, pp. 69–74, 2004.
D. Raúl, H. Ã. Fernando, H. E. Luis, and Q. D. Araceli, "A rev. of multisignatures based on RSA," 2010.
A. Shamir. "Identity-based cryptoSyst. and signature schemes," In: G. R. Blakley, D. (eds) Chaum Advances in Cryptology. CRYPTO 1984. Lecture Notes in Comput. Sci., vol. 196. Springer, Berlin, Heidelberg Workshop on the Theory and Application of Cryptographic Techn. Springer: Heidelberg, 1985. doi: 10.1007/3-540-39568-7_5
S. F. Al-Janabi and A. K. Obaid, "Develop. of Certificate Authority services for web appl.", Future Communication Networks (ICFCN), Int. Conf. on IEEE, 2012. doi: 10.1109/ICFCN.2012.6206857
Z. Yu, "The scheme of public key infrastructure for improving wireless sensor networks security," Software Eng. and Service Sci. (ICSESS), Proc. IEEE 3rd Int. Conf. on IEEE, 2012. doi: 10.1109/ICSESS.2012.6269520
J. Weise, “Public key infrastructure overview,†Sun Blue Prints Online, August, 2001.
J. Sayid, I. Sayid, and J. Kar, "Certificateless Public Key Cryptography: A Res. Survey," Int. J. of Security and Its Appl., vol. 10, no. 7, pp. 103-118, 2016.
M. C. Gorantla, R. Gangishetti, and A. Saxena. "A Survey on ID-Based Cryptographic Primitives." IACR Cryptology ePrint Archive 2005, p. 94, 2005.
Kalyani, D., and R. Sridevi. "Survey on Identity based and Hierarchical Identity based Encryption Schemes." International Journal of Computer Applications 134.14 (2016).