Identity-based encryption schemes - a review
Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption sche...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Journal of Multidisciplinary Engineering Science and Technology (JMEST)
2019
|
Online Access: | http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf http://psasir.upm.edu.my/id/eprint/80144/ https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English |
id |
my.upm.eprints.80144 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.801442020-09-30T03:13:50Z http://psasir.upm.edu.my/id/eprint/80144/ Identity-based encryption schemes - a review Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review. Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf Tea, Boon Chian and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf (2019) Identity-based encryption schemes - a review. Journal of Multidisciplinary Engineering Science and Technology (JMEST), 6 (12). pp. 1-11. ISSN 2458-9403 https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review. |
format |
Article |
author |
Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf |
spellingShingle |
Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Identity-based encryption schemes - a review |
author_facet |
Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf |
author_sort |
Tea, Boon Chian |
title |
Identity-based encryption schemes - a review |
title_short |
Identity-based encryption schemes - a review |
title_full |
Identity-based encryption schemes - a review |
title_fullStr |
Identity-based encryption schemes - a review |
title_full_unstemmed |
Identity-based encryption schemes - a review |
title_sort |
identity-based encryption schemes - a review |
publisher |
Journal of Multidisciplinary Engineering Science and Technology (JMEST) |
publishDate |
2019 |
url |
http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf http://psasir.upm.edu.my/id/eprint/80144/ https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review |
_version_ |
1680322364794994688 |