Identity-based encryption schemes - a review

Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption sche...

Full description

Bibliographic Details
Main Authors: Tea, Boon Chian, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf
Format: Article
Language:English
Published: Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019
Online Access:http://psasir.upm.edu.my/id/eprint/80144/
http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf
_version_ 1848858840760582144
author Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
author_facet Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
author_sort Tea, Boon Chian
building UPM Institutional Repository
collection Online Access
description Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review.
first_indexed 2025-11-15T12:19:51Z
format Article
id upm-80144
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T12:19:51Z
publishDate 2019
publisher Journal of Multidisciplinary Engineering Science and Technology (JMEST)
recordtype eprints
repository_type Digital Repository
spelling upm-801442020-09-30T03:13:50Z http://psasir.upm.edu.my/id/eprint/80144/ Identity-based encryption schemes - a review Tea, Boon Chian Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Identity-based encryption (IBE) allows a user to compute public key from arbitrary string such as name or email address as user’s identity explicitly, thus provides a key-certificateless encryption platform while ensuring message confidentiality. In this paper, several identity-based encryption schemes are reviewed, ranging from the first practical well-known Boneh-Franklin IBE scheme based on pairing function to the recent IBE based on lattices. The aim of this review is to provide an extensive view and classification of these IBE schemes based on their setting, including underlying primitives in the parameter setup, fundamental security behind these schemes, comparative computational complexity and efficiency analysis. This review does not consider the variants of IBE such as hierarchical IBE, fuzzy IBE and those from the similar categories. Some current trends in IBE research and its implementation, along with some possible suggestions in designing new IBE schemes in the future are given as a conclusion of this review. Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2019 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf Tea, Boon Chian and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf (2019) Identity-based encryption schemes - a review. Journal of Multidisciplinary Engineering Science and Technology (JMEST), 6 (12). pp. 1-11. ISSN 2458-9403 https://www.researchgate.net/publication/340062414_Identity-Based_Encryption_Schemes_-_A_Review
spellingShingle Tea, Boon Chian
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
Identity-based encryption schemes - a review
title Identity-based encryption schemes - a review
title_full Identity-based encryption schemes - a review
title_fullStr Identity-based encryption schemes - a review
title_full_unstemmed Identity-based encryption schemes - a review
title_short Identity-based encryption schemes - a review
title_sort identity-based encryption schemes - a review
url http://psasir.upm.edu.my/id/eprint/80144/
http://psasir.upm.edu.my/id/eprint/80144/
http://psasir.upm.edu.my/id/eprint/80144/1/Identity-based%20encryption%20schemes%20-%20a%20review.pdf