International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 134 - Issue 14 |
Published: January 2016 |
Authors: D. Kalyani, R. Sridevi |
![]() |
D. Kalyani, R. Sridevi . Survey on Identity based and Hierarchical Identity based Encryption Schemes. International Journal of Computer Applications. 134, 14 (January 2016), 32-37. DOI=10.5120/ijca2016908158
@article{ 10.5120/ijca2016908158, author = { D. Kalyani,R. Sridevi }, title = { Survey on Identity based and Hierarchical Identity based Encryption Schemes }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 134 }, number = { 14 }, pages = { 32-37 }, doi = { 10.5120/ijca2016908158 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A D. Kalyani %A R. Sridevi %T Survey on Identity based and Hierarchical Identity based Encryption Schemes%T %J International Journal of Computer Applications %V 134 %N 14 %P 32-37 %R 10.5120/ijca2016908158 %I Foundation of Computer Science (FCS), NY, USA
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE) schemes and identity-based signature (IBS) schemes and their security analysis. Later, we discuss the hierarchical identity-based encryption (HIBE) present in standard model as well as in random oracle model. We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions. We review several encryption schemes and their advantages and disadvantages along with their efficiency and security considerations