Beruflich Dokumente
Kultur Dokumente
Abstract— In 1984, Shamir [1] introduced the concept of an however, are the difficulty of choosing a suitable threshold
identity-based cryptosystem. In this system, each user needs to value and the requirement of large memory space for storing
visit a key authentication center (KAC) and identify him self the secret shadow of each user.
before joining a communication network. Once a user is
accepted, the KAC will provide him with a secret key. In this In 1984, Shamir [1] introduced the concept of an identity-
way, if a user wants to communicate with others, he only needs to In this system; each user needs to visit a based cryptosystem.
know the “identity” of his communication partner and the public Key authentication center (KAC) and identify him self before
key of the KAC. There is no public file required in this system. joining the network. Once a user is accepted, the KAC will
However, Shamir did not succeed in constructing an identity provide him with a secret key. In this way, a user needs only
based cryptosystem, but only in constructing an identity-based to know the “identity” of his communication partner and the
signature scheme. Meshram and Agrawal [4] have proposed an id public key of the KAC, together with his secret key, to
- based cryptosystem based on double discrete logarithm problem communicate with others. There is no public file required in
which uses the public key cryptosystem based on double discrete this system. However, Shamir did not succeed in constructing
logarithm problem. In this paper, we propose the modification in an identity-based cryptosystem, but only in constructing an
an id based cryptosystem based on the double discrete logarithm identity-based signature scheme. Since then, much research
problem and we consider the security against a conspiracy of has been devoted, especially in Japan, to various kinds of ID-
some entities in the proposed system and show the possibility of
based cryptographic schemes. Okamoto et al. [10] proposed an
establishing a more secure system.
identity-based key distribution system in 1988, and later, Ohta
Keywords- Public key Cryptosystem, Identity based Cryptosystem, [12] extended their scheme for user identification. These
Discrete Logarithm Problem, Double Discrete Logarithm Problem. schemes use the RSA public key cryptosystem [18] for
operations in modular n, where n is a product of two large
I. INTRODUCTION primes, and the security of these schemes is based on the
computational difficulty of factoring this large composite
In a network environment, secret session key needs to be
number n. Tsujii and Itoh [2] have proposed an ID- based
shared between two users to establish a secret communication.
cryptosystem based on the discrete logarithm problem with
While the number of users in the network is increasing, key
single discrete exponent which uses the ElGamal public key
distribution will become a serious problem. In 1976, Diffie
cryptosystem. Meshram and Agrawal [5] have proposed an
and Hellman [6] introduced the concept of the public key
ID- based cryptosystem based on the integer factoring and
distribution system (PKDS). In the PKDS, each user needs to
double discrete logarithm problem which uses the public key
select a secret key and compute a corresponding public key
cryptosystem based on integer factoring and double discrete
stored in the public directory. The common secrete session
logarithm problem. Meshram and Agrawal [4] have also
key, which will be shared between two users can then be
proposed an ID- based cryptosystem based on double discrete
determined by either user, based on his own secret key and the
logarithm problem which uses the public key cryptosystem
partner‟s public key. Although the PKDS provides an elegant
based on double discrete logarithm problem. Now we
way to solve the key distribution problem, the major concern
Modified this cryptosystem for discrete logarithm problem
is the authentication of the public keys used in the
with distinct double discrete exponent because we face the
cryptographic algorithm.
problem of solving double and triple distinct discrete
Many attempts have been made to deal with the public key logarithm problem at the same time in the multiplicative group
authentication issue. Kohnfelder [7] used the RSA digital of finite fields as compared to the other public key
signature scheme to provide public key certification. His cryptosystem where we face the difficulty of solving the
system involves two kinds of public key cryptography: one is traditional discrete logarithm problem in the common group.
in modular p, where p is a large prime number; the other is in
In this paper , we present modification in an ID based
modular n, where n = p q, and p and q are large primes. Blom
cryptosystem based on the double discrete logarithm problem
[11] proposed a symmetric key generation system (SKGS
with distinct discrete exponent (the basic idea of the proposed
based on secret sharing schemes. The problems of SKGS
30 | P a g e
http://ijacsa.thesai.org/
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 1, No.6, December 2010
system comes on the public key cryptosystem based on double entities secrete key. A simple ways to generate the vectors a
discrete logarithm problem) here we describe further and b is to use Merkle and Hellmans scheme [19].
considerations such as the security of the system, the
identification for senders. etc. our scheme does not require
any interactive preliminary communications in each message Step 4: The center also chooses w which satisfies
transmission and any assumption except the intractability of gcd(w, ( N )) 1 and w ( N ) n , where x also
the discrete logarithm problem.(this assumption seems to be
quite reasonable)thus the proposed scheme is a concrete denote the floor function which implies the largest integer
example of an ID –based cryptosystem which satisfies smaller than compute x .
Shamir‟s original concept [1] in a strict sense.
The center chooses a super increasing sequences
corresponding to a and b as ai (1 i n) & bl (1 l m)
' '
II. MODIFIED ID-BASED PUBLIC KEY CRYPTOSYSTEM
satisfies
A. Implementation of the ID –Based Cryptosystem
Preparation for the center and each entity i 1,l 1
Step 2.: The center generate two random prime number p c a b (mod w)(1 i n)(1 l m)(m n)
i i l
(8)
d e a (mod ( N ))(1 l n)
j
arbitrary large prime number p and q and compute (10)
l l l
N pq and also generated n-dimensional vector a and m-
D (d , d ,.....d )(1 k m)
k k k k
1 2 m
dimensional vector b over Z * ( N ) which satisfies
d e b (mod ( N ))(1 l m)(m n)
k
31 | P a g e
http://ijacsa.thesai.org/
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 1, No.6, December 2010
g l (mod N ), (1 l m)
d y
bl j
(13) (mod ( N ))
1in
i Ai (mod N )
The center informs each entity N , , , h, g as public
s (mod N )a
information.
y Al e l
Step 6. Each entity secrete key: Entity A' s secrete keys s a ( g l ) (mod N )
2
and s b are given by inner product of a and b (the centre‟s 1l m
el
secret information) and EID A (entity A' s extended ID , see
( ( ) bl y Al ) (mod N )
eqn.3)
1l m
sa d l EIDA (mod ( N ))
j
e y (mod ( N ))
1lm l l Al (mod N )
d y Aj (mod ( N ))
j
d l y Al (mod ( N ))
l
1lm
k
1 j n
(14)
(mod N )
b(mod N )
s
sb d l EIDA (mod ( N ))
k
d
k
l
y Aj (mod ( N ))
(15) Entity B use 1
and 2
in Public key cryptosystem
1 j n based on double discrete logarithm problem.
B. System Initialization Parameters Let M (1 M N ) be entity B‟s message to be
Center Secrete information transmitted. Entity B select two random integer u and v such
a : n -dimensional vector and b m-dimensional vector that (2 uv ( N ) 1) and computes
{see (8)-(9)}
C (mod N )
u
Center public information 1
C (mod N )
h : n -dimensional vector & g m-dimensional vector {see v
E M ( ) ( ) (mod N )
u v
integers , two generator and *
of Z ( N ) .
1 2
Entity A' s secrete keys sa and sb = entity A' s public
M (C 1s aC 2s b)(mod N )
information = ID A ,k-dimensional vector.
The cipher text is given by C (C 1, C 2, E ) .
C. Protocol of the proposed cryptosystem
Without loss of generality suppose that entity B wishes to Decryption
send message to entity A. To recover the plaintext M from the cipher text
Encryption Entity A should do the following Compute
Entity B generates EID A (Entity ( N ) sa sa
extended ID, see eqn.3) C1 (mod N ) C1 (mod N )
from ID A . It then computes 1
and 2
from corresponding And C2
( N ) sb
(mod N ) C2
sb
(mod N )
public information h and g and EID A . Recover the plaintext M C 1
sa
C2 sb E (mod N )
y Ai e i
1 ( hi ) (mod N ) III. SECURITY ANALYSIS
1i n The security of the proposed ID based cryptosystem is
based on the intractability of the discrete logarithm problem. It
is very difficult to give formal proofs for the security of a
32 | P a g e
http://ijacsa.thesai.org/
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 1, No.6, December 2010
cryptosystem, in the following; we analyze some possible cryptosystem, where we face the difficulty of solving the
attacks against the above schemes and show that the security traditional discrete logarithm problem in the common groups.
of these attacks is based on the DLP assumption.
1. An intruder should solve a discrete logarithm problem REFERENCES
twice to obtain the private key given the public as [1] A. Shamir “Identity-based cryptosystem and signature scheme,”
Advances in Cryptology: Proceedings of Crypto‟ (Lecture Notes in
following: In this encryption the public key is given by Computer Science 196). Berlin, West Germany: Springer-Verlag, vol.
1 Y ws (mod N )
[10] E. Okarnoto and K. Tanaka, “Key distribution system based on
1 Y ws (mod N )
a
and a
Similarly identification information,” IEEE J. SeIecr. Areas Commun., vol. 7,
pp.481485, May 1989.
2 Y ws (mod N ) b
and 2 Y ws (mod N )
b
by [11] R. Blorn, “An optimal class of symmetric key generation systems.” In
Proc. Eurocryp „84, Pans, France, Apr. 9-11, pp. 335-338,1984.
knowing 1 , 2 , w, w the intruder can derive 1 and 2 as [12] K. Ohta, “Efficient identification and signature schemes.” Electron.
Lett., vol. 24, no. 2, pp. 115-116,1988.
1 1 w
1
w w1w
(mod N ) and 2 2 (mod N ) without [13] Wei-Bin Lee and Kuan-Chieh Liao “Constructing identity-based
cryptosystems for discrete logarithm based cryptosystems” Journal of
knowing s a and sb however trying to obtain w from and Network and Computer Applications,vol. 27, pp. 191–199,2004.
[14] Min-Shiang Hwang, Jung-Wen Lo and Shu-Chen Lin “An efficient user
is equivalent to compute the discrete logarithm problem. identification scheme based on ID-based cryptosystem” Computer
Standards & Interfaces,vol. 26,pp. 565–569,2004.
[15] Eun-Kyung Ryu and Kee-Young Yoo “On the security of efficient user
IV. CONCLUSION identification scheme” Applied Mathematics and Computation 2005,
vol.171, pp. 1201–1205.
In this paper present the modification in an ID-based
cryptosystem based on double discrete logarithm problem with [16] Mihir Bellare , Chanathip Namprempre and Gregory Neven “Security
Proofs for Identity-Based Identification and Signature Schemes” J.
distinct discrete exponents in the multiplicative group of finite Cryptol.,vol. 22, pp. 1–61, 2009.
fields. The proposed scheme satisfies Shamir‟s original [17] S. C. Pohlig and M. E. Hellman, “An improved algorithm for computing
concepts in a strict sense, i.e. it does not require any logarithms over GF (p) and its cryptographic significance,” IEEE Trans.
interactive preliminary communications in each data Inform. Theory, vol. IT-24, pp. 106-110,1978.
transmission and has no assumption that tamper free modules [18] R. L. Rivest, A. Shamir And L. Adelman, “A method for obtaining
are available. This kind of scheme definitely provides a new digital signatures and public-key cryptosystem,” Comrnun. ACM., vol.
scheme with a longer and higher level of security than that 21, no. 2, pp. 120-126,1978.
based on a double discrete logarithm problem with distinct [19] R. C. Merkle and M. E. Hellman, “Hiding information and signatures in
trapdoor knapsacks” IEEE Trans. Inform. Theory, vol. IT- 24, pp. 525-
discrete exponents. The proposed scheme also requires 530,1978.
minimal operations in encryption and decryption algorithms [20] C.S.Laih and J.Y.Lee “Modified ID-Based Public key Cryptosystem
and thus makes it is very efficient. The present paper provides using Discrete Logarithm Problem” Electronic Letters, vol.24 (14)
the special result from the security point of view, because we pp.858-859,1988.
face the problem of solving double and triple distinct discrete
logarithm problem at the same time in the multiplicative group
of finite fields as compared to the other public key
33 | P a g e
http://ijacsa.thesai.org/
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 1, No.6, December 2010
34 | P a g e
http://ijacsa.thesai.org/