2021
DOI: 10.28991/esj-2021-01259
|View full text |Cite
|
Sign up to set email alerts
|

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

Abstract: A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate and distribute the private key to each user to decrypt a message. The thought behind presenting the scheme was to improve and reduce the complexity of certificate and key management, but it also gives rise to key escrow problem, access to encrypted information to una… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The advantage of ID based schemes is that it abstains the use of certificates, which is generally a overhead when there are large number of vehicles deployed on the road. However, the disadvantage of ID based schemes id that, it suffers from key escrow problem [58].…”
Section: Identity Based Cryptography (Ibc) Based Schemesmentioning
confidence: 99%
“…The advantage of ID based schemes is that it abstains the use of certificates, which is generally a overhead when there are large number of vehicles deployed on the road. However, the disadvantage of ID based schemes id that, it suffers from key escrow problem [58].…”
Section: Identity Based Cryptography (Ibc) Based Schemesmentioning
confidence: 99%
“…Digital or literal, Log file or raw data, the PPCT can be applied easily on the different types of transaction unlike other confidentiality protocols that are restricted to numerical data to perform calculations or to some private data to represent identity [32]. In our case, just choose the right Symmetric Encryption algorithms that perform better on the volume and types of data to be exchanged to improve the performance of the protocol [33].…”
Section: G Independence Of Data Type and Sizementioning
confidence: 99%
“…Furthermore, digital communication systems prefer exchanging encrypted messages to sending confidentiality plaintexts [19]. However, in schemes based on public-key encryption, a sender's public key is openly accessible; as a result, anyone can spoof it and transmit an encrypted message to the receiver [20]. As a result, users manipulating public key cryptography for encryption must acquire digital signatures amongst encrypted data to ensure message authentication and non-repudiation.…”
Section: Introductionmentioning
confidence: 99%