The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Implementation of Algorithms for Identity Based Encryption and Decryption
Abstract
Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.
Related Content
P. V. Naveen, A. Poongodi.
© 2026.
24 pages.
|
Sathya Selvaraj Sinnasamy, S. Kamaleswari, U. Surendar, Biswaranjan Senapati, B. Vaidianathan, M. Gandhi.
© 2026.
14 pages.
|
B. Aarthi, A. Smruthi, Pamireddy Thanishka, G. Sakthi Prasanna, P. Mahendran.
© 2026.
18 pages.
|
R. Radhika, A. Muthukumaravel.
© 2026.
24 pages.
|
R. Regin, K. Lalith Reddy, R. Sanjay Narayanan, Y. Likhith Srinivas, R. Steffi, S. Saranya, S. R. Saranya.
© 2026.
26 pages.
|
R. Saranya, S. Silvia Priscila.
© 2026.
20 pages.
|
Manjunath Singh H., R. Tanuja.
© 2026.
28 pages.
|
|
|