Authors: Xavier Boyen
Addresses: Voltage Security, Palo Alto, CA, USA
Abstract: This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Keywords: identity-based encryption; IBE; bilinear pairings; comparison survey; applied cryptography; information security; identity-based cryptography; data security.
International Journal of Applied Cryptography, 2008 Vol.1 No.1, pp.3 - 21
Available online: 06 Feb 2008 *Full-text access for editors Access for subscribers Purchase this article Comment on this article