Cryptanalysis of a technique to transform discrete logarithm based cryptosystems into identity-based cryptosystems

Qiang Tang and Chris J. Mitchell

(2005)

Qiang Tang and Chris J. Mitchell (2005) Cryptanalysis of a technique to transform discrete logarithm based cryptosystems into identity-based cryptosystems.

Our Full Text Deposits

Full text access: Open

Full Text - 85.82 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper we analyse a technique designed to transform any discrete logarithm based cryptosystem into an identity-based cryptosystem. The transformation method is claimed to be efficient and secure and to eliminate the need to invent new identity-based cryptosystems. However, we show that the identity-based cryptosystem created by the proposed transformation method suffers from a number of security and efficiency problems.

Information about this Version

This is a Published version
This version's date is: 01/03/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/a9207a86-a376-79df-b55e-d289df516c39/1/

Item TypeMonograph (Technical Report)
TitleCryptanalysis of a technique to transform discrete logarithm based cryptosystems into identity-based cryptosystems
AuthorsTang, Qiang
Mitchell, Chris J.
DepartmentsFaculty of Science\Mathematics

Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 13-Dec-2010

Notes

References

[1] W. B. Lee and K. C. Liao. Constructing identity-based cryptosystems for
discrete logarithm based cryptosystems. Journal of Network and Computer
Applications, 27:191–199, 2004.

[2] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of
Applied Cryptography. CRC Press, 1997.


Details