CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Survey on Identity based and Hierarchical Identity based Encryption Schemes

by D. Kalyani, R. Sridevi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 14
Year of Publication: 2016
Authors: D. Kalyani, R. Sridevi
10.5120/ijca2016908158

D. Kalyani, R. Sridevi . Survey on Identity based and Hierarchical Identity based Encryption Schemes. International Journal of Computer Applications. 134, 14 ( January 2016), 32-37. DOI=10.5120/ijca2016908158

@article{ 10.5120/ijca2016908158,
author = { D. Kalyani, R. Sridevi },
title = { Survey on Identity based and Hierarchical Identity based Encryption Schemes },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 14 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number14/23985-2016908158/ },
doi = { 10.5120/ijca2016908158 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:15.319818+05:30
%A D. Kalyani
%A R. Sridevi
%T Survey on Identity based and Hierarchical Identity based Encryption Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 14
%P 32-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE) schemes and identity-based signature (IBS) schemes and their security analysis. Later, we discuss the hierarchical identity-based encryption (HIBE) present in standard model as well as in random oracle model. We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions. We review several encryption schemes and their advantages and disadvantages along with their efficiency and security considerations

References
  1. A. Shamir, Identity-based Cryptosystems and Signature Schemes, Proceedings of CRYPTO ’84, LNCS 196, pages 47–53, Springer-Verlag, 1984.
  2. D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Proceedings of CRYPTO 2001, LNCS 2139, pages 213–229, Springer-Verlag, 2001.
  3. A. Joux, One Round Protocol for Tripartite Diffie-Hellman, Algorithmic Number Theory Symposium – Proceedings of ANTS 2002, LNCS 1838, pages 385–394, Springer-Verlag, 2000.
  4. J.Baek and Y.Zheng, Identity-Based Threshold Decryption, Public Key Cryptography – Proceedings of PKC 2004, LNCS 2947, pages 262-276, Springer-Verlag, 2004.
  5. F. Hess, Efficient Identity Based Signature Schemes Based on Pairings, Selected Areas in Cryptography – Proceedings of SAC 2002,LNCS 2595, pages 310–324, Springer-Verlag, 2002.
  6. F. Zhang and K. Kim, ID-based Blind Signature and Ring Signature from Pairings, Advances in Cryptology – Proceedings of ASIACRYPT 2002, LNCS 2501, pages 533–547, Springer-Verlag, 2002.
  7. Yacobi, Yacov, A Note on the Bi-Linear Diffie-Hellman Assumption, Cryptology, ePrint Archive, Report 2002/113.
  8. L.C. Guillou and J.-J. Quisquatar. A “paradoxical” identity-based signature scheme resulting from zero- knowledge. In Advances in Cryptology-Crypto’88 , LNCS 0403, pp. 216-231, Springer-Verlag, 1990.
  9. F. Hess. Efficient Identity Based Signature Schemes Based on Pairings. In Selected Areas in Cryptography-SAC’02, LNCS 2595, pp.310-324, Springer- Verlag, 2003.
  10. R. Sakai, K. Ohgishi and M. Kasahara. Cryptosysytems based on pairing. In Symposium on Cryptography and Information Security-SCIS’00, 2000.
  11. K. G. Paterson. ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/004, 2002. http://eprint.iacr.org/2002/004.
  12. J. Cha and J.H. Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups. In Public Key Cryptography-PKC’03, LNCS 2567, pp.18-30, Springer-Verlag, 2003.
  13. J. H. Cheon, Y. Kim, H. J. Yoon, A New ID-based Signature with Batch Verification, Cryptology ePrint Archive, Report 2004/131, 2004. http://eprint.iacr.org/2004/131.
  14. X. Yi, An Identity-Based Signature Scheme From the Weil Pairing, IEEE Communication Letters, 7(2):76-78, IEEE, 2003.
  15. X. Chen, F. Zhang, K. Kim, A New ID-based Group Signature Scheme from Bilinear Pairings, In Proceedings of WISA’03, LNCS 2908, pp.585-592, Springer-Verlag, 2003.
  16. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, “Identity-based hierarchical strongly key-insulated encryption and its application,” in ASIACRYPT (Lecture Notes in Computer Science), vol. 3788, B. K. Roy, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 495–514.
  17. R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-keyencryption scheme,” J. Cryptol., vol. 20, no. 3, pp. 265–294, Jun. 2007.
  18. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. 15th ACM CCS, 2008, pp. 417–426.
  19. B. Libert and D. Vergnaud, “Adaptive-ID secure revocable identity-based encryption,” in CT-RSA (Lecture Notes in Computer Science), vol. 5473, M. Fischlin, Ed. Berlin, Germany: Springer-Verlag, 2009, pp. 1–15.
  20. J. Chen, H. W. Lim, S. Ling, H. Wang, and K. Nguyen, “Revocable identity-based encryption from lattices,” in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372, W. Susilo,Y. Mu, and J. Seberry, Eds. Berlin, Germany: Springer-Verlag, 2012, pp. 390–403.
  21. B. Waters, “Efficient identity-based encryption without random oracles,” in EUROCRYPT (Lecture Notes in Computer Science), vol. 3494, R. Cramer, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 114–127.
  22. J. M. González-Nieto, M. Manulis, and D. Sun, “Fully private revocable predicate encryption,” in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372, W. Susilo, Y. Mu, and J. Seberry, Eds. Berlin, Germany: Springer-Verlag, 2012, pp. 350–363.
  23. J. H. Seo and K. Emura, “Revocable identity-based encryption revisited: Security model and construction,” in Public-Key Cryptography (Lecture Notes in Computer Science), vol. 7778, K. Kurosawa and G. Hanaoka, Eds. Berlin, Germany: Springer-Verlag, 2013, pp. 216–234.
Index Terms

Computer Science
Information Sciences

Keywords

Identity based Encryption Hierarchical IBE Signature Pairings Fuzzy IBE Revocation IBE.