Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012
DOI: 10.1016/j.ipl.2012.06.018
|View full text |Cite
|
Sign up to set email alerts
|

An ID-based cryptographic mechanisms based on GDLP and IFP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

5
2

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…Meshram et al provided some new, effective IBC schemes using discrete log, generalized discrete log factoring, and integer factoring. Meshram and Meshram presented a new identity‐based beta cryptosystem and a transformation model to convert a PKC protocol to an IBC protocol.…”
Section: Introductionmentioning
confidence: 99%
“…Meshram et al provided some new, effective IBC schemes using discrete log, generalized discrete log factoring, and integer factoring. Meshram and Meshram presented a new identity‐based beta cryptosystem and a transformation model to convert a PKC protocol to an IBC protocol.…”
Section: Introductionmentioning
confidence: 99%
“…Meshram et al 4 proposed an improved version of IBC 5‐9 . Meshram et al 4 considered the solutions to GDLP as well as IPF, as their security assumptions. Also, their technique has not adopted a bilinear pair.…”
Section: Introductionmentioning
confidence: 99%
“…Tsujii and Itoh [21] also proposed an identity-based cryptographic scheme using the DLP with single discrete exponent which uses the ElGamal [22] public key cryptographic scheme. Recently, Meshram [8] used the variant of IFP and DLP to construct their identitybased encryption scheme and proposed many identity-based cryptographic techniques [9][10][11][12] which have been proposed. However, in these techniques, the public key of each entity is not only an identity, it is some random number selected either by the entity or by the trusted authority.…”
Section: Introductionmentioning
confidence: 99%