In this paper we analyse a technique designed to transform anydiscrete logarithm based cryptosystem into an identity-basedcryptosystem. The transformation method is claimed to be efficientand secure and to eliminate the need to invent new identity-basedcryptosystems. However, we show that the identity-basedcryptosystem created by the proposed transformation method suffersfrom a number of security and efficiency problems.
展开▼