Security of Identity-Based Encryption Algorithms

Security of Identity-Based Encryption Algorithms

ISBN13: 9781522574927|ISBN10: 1522574921|EISBN13: 9781522574934
DOI: 10.4018/978-1-5225-7492-7.ch025
Cite Chapter Cite Chapter

MLA

Balasubramanian, Kannan, and M. Rajakani. "Security of Identity-Based Encryption Algorithms." Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2019, pp. 312-325. https://doi.org/10.4018/978-1-5225-7492-7.ch025

APA

Balasubramanian, K. & Rajakani, M. (2019). Security of Identity-Based Encryption Algorithms. In M. Khosrow-Pour, D.B.A. (Ed.), Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (pp. 312-325). IGI Global. https://doi.org/10.4018/978-1-5225-7492-7.ch025

Chicago

Balasubramanian, Kannan, and M. Rajakani. "Security of Identity-Based Encryption Algorithms." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., 312-325. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7492-7.ch025

Export Reference

Mendeley
Favorite

Abstract

The concept of identity-based cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP addresses to form public keys with the corresponding private keys being created by the trusted authority (TA) who is in possession of a systemwide master secret. Then a party, Alice, who wants to send encrypted communication to Bob need only Bob's identifier and the systemwide public parameters. Thus, the receiver is able to choose and manipulate the public key of the intended recipient which has a number of advantages. While IBC removes the problem of trust in the public key, it introduces trust in the TA. As the TA uses the systemwide master secret to compute private keys for users in the system, it can effectively recompute a private key for any arbitrary string without having to archive private keys. This greatly simplifies key management as the TA simply needs to protect its master secret.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.