Survey on Identity based and Hierarchical Identity based Encryption Schemes

  • Kalyani D
  • Sridevi R
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE) schemes and identity-based signature (IBS) schemes and their security analysis. Later, we discuss the hierarchical identity-based encryption (HIBE) present in standard model as well as in random oracle model. We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions. We review several encryption schemes and their advantages and disadvantages along with their efficiency and security considerations General Terms Cryptography, Security.

Cite

CITATION STYLE

APA

Kalyani, D., & Sridevi, R. (2016). Survey on Identity based and Hierarchical Identity based Encryption Schemes. International Journal of Computer Applications, 134(14), 32–37. https://doi.org/10.5120/ijca2016908158

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free