基于身份的密码

Sarvesh Tanwar, Anil Kumar
{"title":"基于身份的密码","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.17010/IJCS/2017/V2/I4/117850","DOIUrl":null,"url":null,"abstract":"Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identity Based Cryptography\",\"authors\":\"Sarvesh Tanwar, Anil Kumar\",\"doi\":\"10.17010/IJCS/2017/V2/I4/117850\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.\",\"PeriodicalId\":127788,\"journal\":{\"name\":\"International Journal in Computer Simulation\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal in Computer Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17010/IJCS/2017/V2/I4/117850\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal in Computer Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17010/IJCS/2017/V2/I4/117850","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数据安全是当今主要关注的问题之一。数字签名是保证消息的身份验证、不完整性和不可否认性的重要组成部分。数字签名可以使用RSA (Rives, Shamir, and Adleman)和椭圆曲线密码术来计算。它可以是一个简单的签名,其中使用发送方的私钥对消息的哈希进行加密。该私钥和相应的公钥由CA (Certificate Authority)生成,公钥绑定在数字证书中。另一种方法是基于身份的(Identity Based, ID)签名,其中私钥由私钥生成器(private Key Generator, PKG)生成,公钥由用户的身份派生[19]。这也被称为无证书通信。在基于ID的签名中,不需要在不安全的通道上传输公钥。公钥可以有效地从接收者的身份信息(如姓名、电子邮件地址、网络地址、IP地址和Aadhar号码)中获得。未经授权的用户可以伪造电子邮件地址。今天,Aadhar号码被用作唯一的身份证明,可以作为ID来派生用户的公钥。但是基于ID的密码学有一个固有的密钥托管,因为它依赖于使用单个主密钥生成用户私钥的PKG。密钥托管使PKG能够解密其域的所有消息。本文基于Shamir和Lein Harn的基于身份的签名,提出了一种安全高效的多重签名方案,该方案可以防止伪造和公钥替换攻击,并对公钥基础设施(PKI)和基于ID的加密进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Identity Based Cryptography
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography. It can be a simple signature in which hash of the message is encrypted with the private key of the sender. This private key and corresponding public keys are generated by Certificate Authority (CA), and public key are binded in the digital certificate. Another approach is Identity Based (ID) signature in which private keys are generated by Private Key Generator (PKG) and public key is derived from the user’s identity [19]. This is also known as certificate less communication. In ID based signature, there is no need to transmit public key over unsecure channel. Public keys are efficiently derived from the receiver’s identity information such as name, email address, network address, IP address, and now Aadhar number. Unauthorized users can forge email addresses. Today Aadhar number is used as a unique identity proof that can be used as ID to derive public key of the user. But ID based cryptography has an inherent key escrow because of its dependence on PKG that uses a single master secret key to generate a user’s private key. Key escrow enables the PKG to decrypt all the messages of its domain. In this paper we have proposed a secure and efficient multiple signatures scheme based on Shamir’s and Lein Harn’s identity based signature that is secure against forgery and public key replacement attack and do a comparison between Public Key Infrastructure (PKI) and ID based cryptography.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信