2010
DOI: 10.1007/978-3-642-13241-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication Using Identity Based Encryption

Abstract: Abstract. Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion Detection Systems (IDS). Furthermore, secure connections require a certain key exchange at the initialization phase, which is prone to Man-In-The-Middle (MITM) attacks. In this paper, we present a new metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The table 1 gives the overview of IBE systems related to security services provided by the system. Also, it provides information about the type of attack which has been detected or prevented by the system Intrusion Detection Sensor(IDS) using IBE [12] Authentication and Confidentiality…”
Section: Survey On Existing Ibe Security Systems Based On Varioumentioning
confidence: 99%
“…The table 1 gives the overview of IBE systems related to security services provided by the system. Also, it provides information about the type of attack which has been detected or prevented by the system Intrusion Detection Sensor(IDS) using IBE [12] Authentication and Confidentiality…”
Section: Survey On Existing Ibe Security Systems Based On Varioumentioning
confidence: 99%
“…Roschke et al [RICM10] propose a technique which detects malicious content in the encrypted data. The solution presented in [RICM10] is based on the IBE [BF01] scheme and suffers from the key escrow property where the compromise of the master secret key compromises the whole system.…”
Section: B Checks Whetherê(w ′ γ)mentioning
confidence: 99%
“…Roschke et al [RICM10] propose a technique which detects malicious content in the encrypted data. The solution presented in [RICM10] is based on the IBE [BF01] scheme and suffers from the key escrow property where the compromise of the master secret key compromises the whole system. The conceptual difference between our approach and the approach presented in [RICM10], is that the technique in [RICM10] uses the master secret key of the IBE to decrypt the ciphertext and then uses the virus scanner to scan the plaintext, while in our approach scanning can be done in the encrypted data, without having to decrypt it.…”
Section: B Checks Whetherê(w ′ γ)mentioning
confidence: 99%
“…Roschke et al [9] propose a technique which detects malicious content in the encrypted data. The solution presented in [9] is based on the IBE [27] scheme and suffers from the key escrow property where the compromise of the master secret key breaks the whole system.…”
Section: Detecting Encrypted Malwarementioning
confidence: 99%
“…Roschke et al [9] propose a technique which detects malicious content in the encrypted data. The solution presented in [9] is based on the IBE [27] scheme and suffers from the key escrow property where the compromise of the master secret key breaks the whole system. The conceptual difference between PKEDS and the approach presented in [9] is, that the scheme in [9] uses the master secret key of the IBE to decrypt the ciphertext and then uses the virus scanner to scan the plaintext, while in PKEDS the scanning can be done in the encrypted data, without having to decrypt it.…”
Section: Detecting Encrypted Malwarementioning
confidence: 99%