This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science
Author
Ashish Tripathi
Org/Univ
St. Andrews Institute of Technology and Management, Khurrampur, Haryana, India
Keywords
Identity-based encryption, Private Key Generator (PKG), Key Generation Center (KGC), Bilinear Diffie-Hellman (BDH), Master public/private key
Citations
IEEE
Ashish Tripathi. Foretaste on identity based encryption, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ashish Tripathi (2019). Foretaste on identity based encryption. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Ashish Tripathi. "Foretaste on identity based encryption." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Ashish Tripathi. Foretaste on identity based encryption, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ashish Tripathi (2019). Foretaste on identity based encryption. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Ashish Tripathi. "Foretaste on identity based encryption." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Abstract
Cryptography is an art which provides confidentiality, integrity, non-repudiation, and authentication to the parties involve in communication. Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. PKG uses user’s credentials to publish the public key and after authentication of the user, it grants it is a master private key. Security of IBE depends on the trust of issuing authority. The purpose of this paper is to review the technological aspects in cryptography under Identity-based scheme. Section I provide an introduction of the scheme illustrating its background and procedure: Section II throw light on few schemes of IBC with their proofing algorithms while Section III mention the pros and cons of this scheme and finally the conclusion. Section IV summarises the content as the conclusion of the paper. Section V list the references that were sighted in the writing of this paper.