ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IJSET@2014 Page 139 Public Key Encryption without using Certificate based on Identity Based Cryptography

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 139-143

Keywords : Identity based cryptography; Public key infrastructures; Digital information security and certificate based PKI.;

Source : Downloadexternal Find it from : Google Scholarexternal


It has been proven for many years that security for digital information can be attained by the cryptography techniques. Identity based cryptography (IBC) is an emerging area in cryptography schema. Identity based cryptography is the new system which reduces the key management process in traditional public key infrastructures (PKI). The main drawbacks of the traditional Public key cryptosystems (PKC) are use of very long keys, the high cost of the infrastructure and the difficulty in managing multiple parties involved in the process. In PKC digital certificates are used to connect an identity of a person or a machine to a public key. IBC is the extension of public key crypto system. The public keys of IBC system created from any arbitrary unique information like identities, or strings derived from their identities. Any public information such as the e-mail address, name, phone numbers, etc., can be used as a public key. The algorithm for IBC resolves the problem of getting the public key of a user and checking the validity of certificate and helps to avoid the trust problems encountered in traditional certificate based PKI. Two users can communicate in secured manner without the need for exchanging of public or private keys and without keeping any key directories to store the public keys. In this paper we are proposing an algorithm that uses the Identity Based Cryptosystem and its applications in various fields.

Last modified: 2014-02-04 19:41:29