加密
计算机安全
公钥密码术
密文
计算机科学
钥匙(锁)
密码学
身份(音乐)
基于身份的加密
方案(数学)
基于属性的加密
密钥分发
数学
物理
声学
数学分析
作者
Deepak Kumar Sharma,Bhanu Tokas,Venkata Rohit Jakkinapalli,Ritvik Nagpal
出处
期刊:EAI/Springer Innovations in Communication and Computing
日期:2021-01-01
卷期号:: 137-149
标识
DOI:10.1007/978-3-030-60890-3_8
摘要
There has been an unprecedented rise in insecure computer networks in the last few decades. This has led to a rise in the need for large-scale cryptography to improve security. Public key encryption is a relatively new concept that has risen in prominence due to the limitations in the more traditional symmetric cryptographic methods like key management which becomes impractical when used at a large scale. Identity-based encryption (IBE) systems are defined as a category of public key encryption wherein the user’s public key is derived from a distinctive identity of a user (for example, email ID). In this chapter, we will talk about the first IBE scheme with the comprehensive analysis that will include reviewing all the four stages involved: setup, extract, encrypt, and decrypt. We will also discuss the different conceptions of security, such as chosen ciphertext security and semantically secure identity-based systems, with detailed examination about the security of this scheme.
科研通智能强力驱动
Strongly Powered by AbleSci AI