Identity Based Encryption and Identity Based Signature Scheme on Security Schemes
Maitri Patel1, Rajan Patel2

1Maitri Patel, Research Scholar, Faculty of Engineering & Technology Sakalchand Patel University, Visnagar, Mehsana, Gujarat, India.
2Rajan Patel, Associate Professor, Department of Computer Engineering, Gandhinagar Institute of Technology, Moti-Bhoyan, Gandhinagar.
Manuscript received on 24 August 2019. | Revised Manuscript received on 06 September 2019. | Manuscript published on 30 September 2019. | PP: 3487-3493 | Volume-8 Issue-11, September 2019. | Retrieval Number: K25640981119/2019©BEIESP | DOI: 10.35940/ijitee.K2564.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In computer based system, key for the problem of identification, authentication and secrecy can be found in the field of cryptography. Dependence on public key infrastructure and to receive certificates signed by Certificate Authority (CA) to authenticate oneself for exchange of encrypted messages is one of the most significant limitation for the widespread adoption of Public Key Cryptography (PKC) as this process is time engrossing and error prone. Identity based cryptography (IBC) aspires to reduce the certificate and key management overhead of PKC. IBC’s important primordial is Identity-based Encryption (IBE). IBE provided emergent for perception of Identity based signature (IBS) schemes. In this paper, overview of IBE and IBS schemes has been given. Also, a survey on various IBE and IBS schemes has been performed to review different problems related to them. Finally, feasibility and applicability of IBC in current and future environments has been discussed.
Keywords: Certification Authority, Identity Based Cryptography, Public Key Cryptography, Identity Based Encryption, Security, Identity Based Signature.
Scope of the Article: Security, Privacy and Trust in IoT & IoE.