Open Access Open Access  Restricted Access Subscription Access

Identity Based Cryptography


Affiliations
1 Research Scholar, Department of Computer Science & Engineering, College of Engineering & Technology (CET), Mody University of Science & Technology, Lakshmangarh (Rajasthan)-332311, India
2 Professor and Head, Department of Computer Science & Engineering, Mody University of Science & Technology, Rajasthan-332311, India

   Subscribe/Renew Journal


Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.

Keywords

Aadhar Number, Digital Certificate, Digital Signature Standard (DSS), Key Escrow, Private Key Generator (PKG)

No Classification

Manuscript received May 21, 2017; revised July 13, 2017; accepted July 15, 2017. Date of publication August 6, 2017.

User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 174

PDF Views: 0




  • Identity Based Cryptography

Abstract Views: 174  |  PDF Views: 0

Authors

Sarvesh Tanwar
Research Scholar, Department of Computer Science & Engineering, College of Engineering & Technology (CET), Mody University of Science & Technology, Lakshmangarh (Rajasthan)-332311, India
Anil Kumar
Professor and Head, Department of Computer Science & Engineering, Mody University of Science & Technology, Rajasthan-332311, India

Abstract


Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.

Keywords


Aadhar Number, Digital Certificate, Digital Signature Standard (DSS), Key Escrow, Private Key Generator (PKG)

No Classification

Manuscript received May 21, 2017; revised July 13, 2017; accepted July 15, 2017. Date of publication August 6, 2017.




DOI: https://doi.org/10.17010/ijcs%2F2017%2Fv2%2Fi4%2F117850