Performance Comparison of Identity Based Encryption and Identity Based Signature
نویسندگان
چکیده
Dependence on a public key infrastructure (PKI) is the prominent obstructer in the path of following a public key cryptography widespread, which is held together among various users. In order to ensure authenticated communication, encryption and signature key pair must be generated by each senders and receivers. Apart from this, request along with the proof of identity should also be submitted to the Certificate Authority (CA) and receive CA-Signed certificates, so that it can be used to authenticate one another and exchange encrypted message while limitations of this is that it consumes more time and is error-prone as well. So to get rid of this menace we need to explore few alternatives which will not ask about certificates for encryption and signature verification. Thus, we identify that identity based cryptography approach is one of the robust alternative feature. Using this Characteristic we will be able to overcome the complexity of a cryptography system to a greater extent by ignoring use of generating and managing user’s certificates. Integer factorization, quadratic residue and bilinear pairing are the parameters on the basis of which we review the identity based cryptographic primitive. To make sure how it works several major proposals for identity based encryption schemes and identity based signature schemes has been explored along with their performance comparisons.
منابع مشابه
Survey on Identity Based Blind Signature
In this paper, we survey the state of research on Identity Based Blind Signature. We start from reviewing the basic concepts of identity based encryption and blind signature schemes and subsequently review the framework of ID-based blind signature, and classification of ID-based blind signature. Lastly, we discuss the applications of ID-based blind signature. Keywords— Identity Based Encryption...
متن کاملIdentity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based on the Naor transformation of a identity-based signature out of an identity-based encryption, adjusted to hierarchical identity-based encryption. We identify sufficient conditions on the underlying HIBE so that the sch...
متن کاملAn Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user’s identity in identity (ID)based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Libert et al. and Baek et al. respectively propose an ID-based mediated encryption scheme based on the practical ID-based encryption scheme from bilinear pairing due to Bone...
متن کاملA Computational Review of Identity-based Signcryption Schemes
Since 2002, several identity based signcryption schemes have been proposed. The purpose of designing a signcryption scheme is to perform signature and encryption both in one step but at lesser cost than performing signature and then encryption separately. In this paper, we present a literature survey on signcryption schemes for identity based setup. Our primary focus is on the schemes recently ...
متن کاملSecure Identity-Based Blind Signature Scheme in the Standard Model
The only known construction of identity-based blind signature schemes that are secure in the standard model is based on the generic approach of attaching certificates to ordinary (i.e. non-identity-based) blind signature schemes, and thus the identity-based blind signature schemes constructed using this method are somewhat inefficient and have long signature size. In this paper, we present the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012