Qiang Tang and Chris J. Mitchell (2005) Cryptanalysis of a technique to transform discrete logarithm based cryptosystems into identity-based cryptosystems.
Full text access: Open
In this paper we analyse a technique designed to transform any discrete logarithm based cryptosystem into an identity-based cryptosystem. The transformation method is claimed to be efficient and secure and to eliminate the need to invent new identity-based cryptosystems. However, we show that the identity-based cryptosystem created by the proposed transformation method suffers from a number of security and efficiency problems.
This is a Published version This version's date is: 01/03/2005 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/a9207a86-a376-79df-b55e-d289df516c39/1/
Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 13-Dec-2010
[1] W. B. Lee and K. C. Liao. Constructing identity-based cryptosystems fordiscrete logarithm based cryptosystems. Journal of Network and ComputerApplications, 27:191–199, 2004.
[2] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook ofApplied Cryptography. CRC Press, 1997.