Identity-based encryption schemes - a review

Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption sche...

Full description

Saved in:
Bibliographic Details
Main Authors: Tea, Boon Chian, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf
Format: Article
Language:English
Published: Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019
Online Access:http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf
http://psasir.upm.edu.my/id/eprint/80144/
https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
id my.upm.eprints.80144
record_format eprints
spelling my.upm.eprints.801442020-09-30T03:13:50Z http://psasir.upm.edu.my/id/eprint/80144/ Identity-based encryption schemes - a review Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review. Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf Tea, Boon Chian and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf (2019) Identity-based encryption schemes - a review. Journal of Multidisciplinary Engineering Science and Technology (JMEST), 6 (12). pp. 1-11. ISSN 2458-9403 https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review.
format Article
author Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
spellingShingle Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
Identity-based encryption schemes - a review
author_facet Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
author_sort Tea, Boon Chian
title Identity-based encryption schemes - a review
title_short Identity-based encryption schemes - a review
title_full Identity-based encryption schemes - a review
title_fullStr Identity-based encryption schemes - a review
title_full_unstemmed Identity-based encryption schemes - a review
title_sort identity-based encryption schemes - a review
publisher Journal of Multidisciplinary Engineering Science and Technology (JMEST)
publishDate 2019
url http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf
http://psasir.upm.edu.my/id/eprint/80144/
https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review
_version_ 1680322364794994688