Identity-Based Cryptography Techniques and Applications (A Review)

D. Anand, V. Khemchandani, R. Sharma
{"title":"Identity-Based Cryptography Techniques and Applications (A Review)","authors":"D. Anand, V. Khemchandani, R. Sharma","doi":"10.1109/CICN.2013.78","DOIUrl":null,"url":null,"abstract":"This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"371 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2013.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

Abstract

This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.
基于身份的密码技术及其应用(综述)
本文综述了信息交换领域的重要课题——基于身份的密码学的研究现状,它或多或少是公钥密码学领域的延伸。本文首先分析了基于身份的密码技术的基本概念,包括加密技术和用于身份验证的数字签名技术,即基于身份的签名技术。然后,本文继续分析了基于身份密码的各种技术和应用,其中基于双线性配对的方法是目前文献中广泛使用的一种计算方法,用于构建各种基于身份的密码系统。随后,本文回顾了当前时代基于身份的加密技术在ad-hoc网络、移动网络和其他无线网络等各种网络领域的应用。在本文的最后,我们讨论了基于身份的加密技术在当前和未来环境中使用的现实程度以及在哪些参数下使用,以及它的优点和局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信