Authors | Mojtaba Bahramian, Maryam Sheikhi |
---|---|
Conference Title | The Second Conference on Computational Group Theory, Computational Number Theory and Applications |
Holding Date of Conference | 2015-10-13 |
Event Place | Kashan |
Presentation | SPEECH |
Conference Level | Internal Conferences |
Abstract
In this paper, we review the identity-based encryption scheme (IBE) which is an emerging area of public key cryptography. In IBE scheme encryption key can be any string (such email address, phone number). First of all, we give the basic consepts of IBE schemes and subsecuently explain an IBE scheme based on bilinear maps between groups. Finally, we discuss advantages and disadvantages of IBE schemes.