The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Implementation of Algorithms for Identity Based Encryption and Decryption
Abstract
Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.
Related Content
D. Lavanya, Divya Marupaka, Sandeep Rangineni, Shashank Agarwal, Latha Thammareddi, T. Shynu.
© 2024.
17 pages.
|
A. Sabarirajan, N. Arunfred, V. Bini Marin, Shouvik Sanyal, Rameshwaran Byloppilly, R. Regin.
© 2024.
14 pages.
|
P.S. Venkateswaran, M. Lishmah Dominic, Shashank Agarwal, Himani Oberai, Ila Anand, S. Suman Rajest.
© 2024.
16 pages.
|
Thangaraja Arumugam, R. Arun, R. Anitha, P. L. Swerna, R. Aruna, Vimala Kadiresan.
© 2024.
12 pages.
|
Thangaraja Arumugam, R. Arun, Sundarapandiyan Natarajan, Kiran Kumar Thoti, P. Shanthi, Uday Kiran Kommuri.
© 2024.
15 pages.
|
H. Hajra, G. Jayalakshmi.
© 2024.
17 pages.
|
H. Hajra, G. Jayalakshmi.
© 2024.
19 pages.
|
|
|