A Detailed Survey on Identity-based Key Encapsulation Mechanism
نویسندگان
چکیده
The main purpose of key distribution is to provide efficient and effective security to commence with security providing schema in view of smart devices in IOT generally focalize on cryptographic method. In established usage of key distribution mechanism in real-time system services, it is most often deficient to build multiple channels with strong security simultaneously on a single data server. Implementation of the IBKEM to our system and achieve anonymous key distribution with one-pass communication for clients in batch.
منابع مشابه
A Standard for Encryption and Key Encapsulation
The main purpose of this document is to provide simple and high-level, yet actionably, concrete, and standard descriptions of two practical instantiations of the Boneh-Boyen BB1 identity-based cryptosystem. One instantiation is an full encryption (or IBE) system, the other a key encapsulation mechanism (or IBKEM). A secondary purpose of the document is to discuss the many extensions of practica...
متن کاملDirect Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes. Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mecha...
متن کاملExtensions of Public-Key, Identity-Based and Certificateless Encryption Schemes
In this work, we first study extensions and applications of the identity-based encryption (IBE) primitive, focusing on generic constructions. We first define what is meant by an identity-based key encapsulation mechanism before extending it to the multi-recipient setting. We then propose an efficient multi-recipient scheme based on bilinear maps and then move on to investigate the properties of...
متن کاملIdentity-Based Key-Encapsulation Mechanism from Multilinear Maps
We construct an Identity-Based Key Encapsulation Mechanism (IBKEM) in a generic “leveled” multilinear map setting and prove its security under multilinear decisional Diffie-Hellmanin assumption in the selective-ID model. Then, we make our IB-KEM translated to the GGH framework, which defined an “approximate” version of a multilinear group family from ideal lattices, and modify our proof of secu...
متن کاملAn Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
Sakai et. al in 2000 produced a method of construction identity based public/private key pairs using pairings on elliptic curves. In 2001, using the same key construction as Sakai et. al., Boneh and Franklin presented the first efficient and provably secure identity-based encryption scheme. In 2003 Sakai and Kasahara proposed another method of constructing identity based keys, also using pairin...
متن کامل