Thursday 13 August 2015

Identity-Based Cryptography

        The progressive era of computer systems and telecommunications have call for the pervasive development of technology that prioritizes the security, confidentiality and authenticity of information. Hence, the identity-based cryptography has been invented and is utilized in the world of telecommunication and information technology. Identity-based cryptography is a kind of public-key computerized decoding among openly known string which may represent an individual or an organization. The public string utilized may include an electronic mail address, domain name or IP address. IBC proficiently manages the keying material and supply an easy way of issuing a pair of key applicable to the user‘s key information.
   Cryptography is a science and art of message encryption that transforms a message into a covered version that cannot be intercepted and understood by unauthorized individuals but it can be successfully received and understood by the anticipated receiver. The procedure of encrypting and decrypting a message is governed by keys which are commonly composed of the small information and cryptographic algorithms[1]. It is used in order to provide security goals among ad hoc networks especially that the lots of threats are experienced in this communication system.
  The identity-based cryptography is dependent on the third party called the private key generator (PKG) which can generate either a public or private keypair (indicated by pkPKG or skPKG) and make the pkPKG accessible to the users of the services. The given keys are known as the “master”, and there are two masters – public key and the private key, respectively. Both the public and private keys are interrelated in the sense that only the public key which is utilized in encrypting messages and on the other hand it is the matching private key which can be employed in decrypting the code. Therefore if an outsider compromises the public key, it is them not viable to figure out the private key, hence the message will not be decoded. The relevance of identity-based cryptography is that it requires accurate validation of certificate since it involves multiple node certificate instead of a chain of certificates.
  The procedure of encryption indeed ascertains the confidentiality of the message that is sent. It is accompanied by having a digital signature that strengthens the security goals of the message. The transmission of the message is done by sending a message using the algorithm key and a private key as signature of the message. Then the message along with the signature is sent to the receiver, and the recipient will also apply the verification algorithm on the message-signature pair[2]. This verification algorithm needs a verification key which is the public key provided by the signer in order to verify the documents or messages. It is after the verification stage wherein the message will be accepted or rejected depending on the result of the verification.
  Though the IBC had proven to be an efficient mechanism in securing and keeping safe of confidential information, still it has its limitations that must be addressed properly in order to ensure efficiency and proficiency of its functions. This technology provides wireless communication that promotes more secured and protected transmission of messages. These new schemes can be utilized as bases for administering programs and security plans in the promulgation of confidentiality, availability and authenticity of messages.



1. Sagheer, Ali and Taher, Hadeel. “Identity Based Cryptography for Secure AODV Routing Protocol”. (2012). 198-201. Telecommunications Forum.
2. Youngblood, Carl. “An Introduction to Identity-based Cryptography”. (2005). CSEP. 1- 7.      

No comments:

Post a Comment