DocumentCode :
2144067
Title :
Identity-Based Cryptography Techniques and Applications (A Review)
Author :
Anand, Dhananjay ; Khemchandani, V. ; Sharma, Ratnesh K.
Author_Institution :
Dept. of Comput. Sci., H.I.T.M., Agra, India
fYear :
2013
fDate :
27-29 Sept. 2013
Firstpage :
343
Lastpage :
348
Abstract :
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.
Keywords :
digital signatures; public key cryptography; ad-hoc networks; bilinear pairing; digital signature; identity based signature; identity-based cryptography techniques; information interchange; mobile networks; public key cryptography; wireless networks; Encryption; Mobile communication; Protocols; Public key cryptography; Cryptography; ID-Based Cryptography; Information Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on
Conference_Location :
Mathura
Type :
conf
DOI :
10.1109/CICN.2013.78
Filename :
6658013
Link To Document :
بازگشت