Identity-based encryption schemes - a review

Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption sche...

Full description

Saved in:
Bibliographic Details
Main Authors: Tea, Boon Chian, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf
Format: Article
Language:English
Published: Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019
Online Access:http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf
http://psasir.upm.edu.my/id/eprint/80144/
https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
Description
Summary:Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review.