2016
DOI: 10.5120/ijca2016908158
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Identity based and Hierarchical Identity based Encryption Schemes

Abstract: In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE) schemes and identity-based signature (IBS) schemes and their security analysis. Later, we discuss the hierarchical id… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…In the research [9], a new HIBE with the maximum hierarchy depth was proposed. When the system is initialized, the maximum hierarchy depth should be given.…”
Section: Related Workmentioning
confidence: 99%
“…In the research [9], a new HIBE with the maximum hierarchy depth was proposed. When the system is initialized, the maximum hierarchy depth should be given.…”
Section: Related Workmentioning
confidence: 99%
“…The cryptography provides secure communication of digital information. It might be in the form of a public-key system where a public key can be a user's identity such as email addresses [43]. Identity-based cryptography also helps social media users to find friends in a privacy-preserving way.…”
Section: General Open Research Challengesmentioning
confidence: 99%
“…In the literature, several surveys have been conducted to study research efforts in the field of object authentication. In [13][14][15][16][17][18][19][20] authentication schemes based on IBC have been studied. The objectives of these surveys were to review the main concepts of IBC, summarize several IBC authentication schemes, highlight their main advantages and disadvantages, discuss the main applications of IBC, and highlight some issues related to the future use of IBC.…”
Section: Related Workmentioning
confidence: 99%