Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2011.020805
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 2 Issue 8, 2011.
Abstract: In 1984, Shamir  introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme. Meshram and Agrawal  have proposed an id - based cryptosystem based on integer factoring and double discrete logarithm problem which uses the public key cryptosystem based on integer factoring and double discrete logarithm problem. In this paper, we propose the modification in an id based cryptosystem based on the integer factoring and double discrete logarithm problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
Chandrashekhar Meshram and S.A. Meshram, “Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP” International Journal of Advanced Computer Science and Applications(IJACSA), 2(8), 2011. http://dx.doi.org/10.14569/IJACSA.2011.020805