loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Antigoni Polychroniadou 1 ; Kostantinos Chalkias 2 and George Stephanides 2

Affiliations: 1 University of London, United Kingdom ; 2 University of Macedonia, Greece

ISBN: 978-989-8565-08-2

Keyword(s): Compatibility, Identity-based Encryption, Certificateless Encryption, Protocol Classification, Efficiency Comparison, Compatible Implementation.

Related Ontology Subjects/Areas/Topics: Internet Technology ; Protocols and Standards ; Web Information Systems and Technologies ; Web Security and Privacy

Abstract: In this paper we put into practice the concept of compatibility and we present a classification of two IBE-related schemes, the Identity-Based Encryption (IBE) and the Certificate-Less Encryption (CLE). An innovative implementation of a compatible IBE and CLE system was developed in order to support different encryptions on-the-fly based on the user’s needs at a specific moment. Motivated from the fact that there are numerous theoretically efficient IBE-related schemes in the literature overshadowing the benefits of traditional public key encryption (PKI) schemes, they did not, in any important way implemented into practice, as the widely-used PKI. The question is why this is the case since IBE solves a number of problems associated with PKI. Therefore, the controversial issue concerning the widespread use of IBE schemes into practice and the issue of compatibility between IBE and CLE are discussed in this paper. These real problems hinder the wide use of IBE. However, it cannot be de nied that IBE, which can be extended to support a plethora of encryption models, gains widespread adoption day by day as it solves problems within conventional public key schemes and it results in a simplified key management, making it much more lightweight to deploy. Based on the fact that a number of different encryption schemes stemmed from IBE, an implementation of an IBE-related compatible system is important. Our approach categorizes known concrete constructions from two IBE-related types into classes and analyzes similarities concerning public settings, used keys, protocol structures and provided model of provable security. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.200.74

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Polychroniadou, A.; Chalkias, K. and Stephanides, G. (2012). A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES.In Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-989-8565-08-2, pages 225-230. DOI: 10.5220/0003975302250230

@conference{webist12,
author={Antigoni Polychroniadou. and Kostantinos Chalkias. and George Stephanides.},
title={A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES},
booktitle={Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2012},
pages={225-230},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003975302250230},
isbn={978-989-8565-08-2},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES
SN - 978-989-8565-08-2
AU - Polychroniadou, A.
AU - Chalkias, K.
AU - Stephanides, G.
PY - 2012
SP - 225
EP - 230
DO - 10.5220/0003975302250230

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.