R. Abobeah, M. Ezz, and H. Harb. International Journal of Computer Networks and Applications (IJCNA), 2 (2):
64-75(April 2015)
Abstract
Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.
%0 Journal Article
%1 abobeah2015publickey
%A Abobeah, Reham M.
%A Ezz, Mohamed M.
%A Harb, Hany M.
%D 2015
%J International Journal of Computer Networks and Applications (IJCNA)
%K Asymmetric CL-PKC Certificate IBC Key PKI Revocation cryptography escrow
%N 2
%P 64-75
%T Public-Key Cryptography Techniques Evaluation
%U http://www.ijcna.org/Manuscripts/Volume-2/Issue-2/Vol-2-issue-2-M-05.pdf
%V 2
%X Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.
@article{abobeah2015publickey,
abstract = {Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.},
added-at = {2016-10-14T11:31:07.000+0200},
author = {Abobeah, Reham M. and Ezz, Mohamed M. and Harb, Hany M.},
biburl = {https://www.bibsonomy.org/bibtex/220f897cd5de8972fad410dcefa8a2a37/ijcnaeditor},
interhash = {008a2f58e90080193e6b78ce13c970bf},
intrahash = {20f897cd5de8972fad410dcefa8a2a37},
journal = {International Journal of Computer Networks and Applications (IJCNA)},
keywords = {Asymmetric CL-PKC Certificate IBC Key PKI Revocation cryptography escrow},
month = {April},
number = 2,
pages = {64-75},
timestamp = {2016-10-14T11:31:07.000+0200},
title = {Public-Key Cryptography Techniques Evaluation},
url = {http://www.ijcna.org/Manuscripts/Volume-2/Issue-2/Vol-2-issue-2-M-05.pdf},
volume = 2,
year = 2015
}