Reference Hub2
Implementation of Algorithms for Identity Based Encryption and Decryption

Implementation of Algorithms for Identity Based Encryption and Decryption

Kannan Balasubramanian, M. Rajakani
Copyright: © 2019 |Volume: 1 |Issue: 1 |Pages: 11
ISSN: 2577-4816|EISSN: 2577-4824|EISBN13: 9781522563570|DOI: 10.4018/IJCRE.2019010106
Cite Article Cite Article

MLA

Balasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." IJCRE vol.1, no.1 2019: pp.52-62. http://doi.org/10.4018/IJCRE.2019010106

APA

Balasubramanian, K. & Rajakani, M. (2019). Implementation of Algorithms for Identity Based Encryption and Decryption. International Journal of Cyber Research and Education (IJCRE), 1(1), 52-62. http://doi.org/10.4018/IJCRE.2019010106

Chicago

Balasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption," International Journal of Cyber Research and Education (IJCRE) 1, no.1: 52-62. http://doi.org/10.4018/IJCRE.2019010106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.