Identity and attribute-based cryptosystems have now become the most interesting research area in cryptography. Id-based and attribute-based cryptography both are improved variants of public-key cryptography. The identity-based cryptography is based on the identity of the user, such as email address, IP address, or mobile number. On the other hand, in attribute-based cryptography users encrypt and decrypt the message based on their attributes. Both IBE and ABE are based on mathematical concepts like Integer factorization, Quadratic Residues, Discrete logarithm Problems, Diffie-Hellman problems, and Bilinear pairings. IBE allows users to encrypt and decrypt messages using their identities whereas ABE provides fine-grain access control, it allows organizations and individuals to access data based on specific attributes or properties. IBE and ABE have various applications in cloud computing, digital signatures, and secure data sharing in IoT. Most ABE schemes based on access structure can be categorized as Key-Policy ABE (KP-ABE) and ciphertext-based ABE (CP-ABE).
TopIntroduction
Security in the world of the internet has become a very important need and necessity in all aspects of social life. Information data security is the main and leading factor that determines whether the information data is still useful and can be used. The level of security of the information data to be used varies depending on the usefulness of the information data. In the world of e-commerce, data information that is used and exchanged has a high level of security criteria to prevent misuse and piracy.
One of the techniques of securing data information in the internet world is the Asymmetric cryptography technique. A cryptographic algorithm contains mathematical functions that are used to carry out the encryption and decryption process. The mathematical basis that underlies the process of encryption and decryption is the relation between two sets, namely those containing plaintext elements and those containing cipher text elements.
At first, cryptography was very simple, like the ancient Greeks were known to use ciphers t transform a message. In 100 BC, Julius Caesar used a form of encryption to share secret messages with his army generals at was. For example, A becomes D, B becomes E, C becomes f, i.e., spot shift of 3 in the alphabetic series. But, the more advanced people become at deciphering encrypted messages, the more necessary it is for cryptography to advance in response. In the early years, only one key was used for encrypting a message, which is known as symmetric key cryptography, it is still the most used cryptography for secure communication. In 1976, Whitfield Diffie and Martin Hellman published a research paper on what would be defined as the Diffie-Hellman key exchange. The code was no longer pre-arranged for the first time, but a pair of keys, one is the private key and other is the public key, which is mathematically linked, was created for every participant. This is the beginning of the asymmetric key cryptography.
Shamir (1985) introduced the concept of identity-based cryptography. Its primary innovation was its use of user identity attributes, such as email addresses or phone numbers, instead of digital certificates, for encryption and signature verification. This feature significantly reduces the complexity of a cryptography system by eliminating the need for generating and managing users' certificates. It also makes it much easier to provide cryptography to unprepared users, since messages may be encrypted for users before they interact with any system components. At the time Shamir published his proposal he had already determined a way of using the existing RSA function for an identity-based signature (IBS) scheme but had yet to solve the problem of identity-based encryption (IBE). This remained an open problem until 2001 when two independent lines of research (Boneh and Franklin (2001), as well as Cocks) arrived at solutions to the problem. Since this time, identity-based cryptography has been a heavily-researched topic in the field of cryptography. In addition to academic research, commercial product offerings are also now available, most notably those of Voltage Security, Inc.
In this paper, we have discussed public key cryptography and its application then we discussed Id-based cryptography and Attribute-based cryptography and their application. After that, we discussed their comparative studies.