On the Risks of IBE

نویسندگان

  • Himanshu Khurana
  • Jim Basney
چکیده

Identity-based encryption (IBE) techniques promise to solve the key distribution problem for secure email. We argue that before this technology is adopted for the important application of secure email it needs to be critically examined in terms of its benefits and risks. To that end our analysis summarizes the unique benefits of IBE and also the significant assumptions and limitations behind it. We then argue that all of these benefits can be achieved with RSA without any additional assumptions and limitations by developing IB-MKD (Identity Based Message Key Distribution).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Surgical Excision Without Radiation for Ductal Carcinoma in Situ of the Breast: 12-Year Results From the ECOG-ACRIN E5194 Study.

PURPOSE To determine the 12-year risk of developing an ipsilateral breast event (IBE) for women with ductal carcinoma in situ (DCIS) of the breast treated with surgical excision (lumpectomy) without radiation. PATIENTS AND METHODS A prospective clinical trial was performed for women with DCIS who were selected for low-risk clinical and pathologic characteristics. Patients were enrolled onto o...

متن کامل

A Multigene Expression Assay to Predict Local Recurrence Risk for Ductal Carcinoma In Situ of the Breast

BACKGROUND For women with ductal carcinoma in situ (DCIS) of the breast, the risk of developing an ipsilateral breast event (IBE; defined as local recurrence of DCIS or invasive carcinoma) after surgical excision without radiation is not well defined by clinical and pathologic characteristics. METHODS The Oncotype DX breast cancer assay was performed for patients with DCIS treated with surgic...

متن کامل

On the Role of PKG for Proxy Re-encryption in Identity Based Setting

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

متن کامل

Managing the Peruvian Upwelling Ecosystem:

A brief review is given of Ibe interrelationships and implications of Ibe findings reported in Ibe contributions included in this volume. Emphasis is given to some questions Ibat now appear crucial, e.g. Ibe cannibalization of anchoveu eggs and biannual cycles in anchoveta recruitment and their possible cause(s). Some suggestions are made for future research on various elements of Ibe Peruvian ...

متن کامل

Some Implementation Issues for Security Services based on IBE

Identity Based Encryption (IBE) is a public key cryptosystem where a unique identity string, such as an e-mail address, can be used as a public key. IBE is simpler than the traditional PKI since certificates are not needed. An IBE scheme is usually based on pairing of discrete points on elliptic curves. An IBE scheme can also be based on quadratic residuosity. This paper presents an overview of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006