Open Access Open Access  Restricted Access Subscription Access

Public-Key Cryptography Techniques Evaluation


Affiliations
1 Systems and Computers Engineering Department, Al-Azhar University, Cairo, Egypt
 

Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.

Keywords

Asymmetric cryptography, PKI, IBC, CL-PKC, Certificate, Key Escrow, Revocation.
User
Notifications
Font Size

Abstract Views: 262

PDF Views: 2




  • Public-Key Cryptography Techniques Evaluation

Abstract Views: 262  |  PDF Views: 2

Authors

Reham M. Abobeah
Systems and Computers Engineering Department, Al-Azhar University, Cairo, Egypt
Mohamed M. Ezz
Systems and Computers Engineering Department, Al-Azhar University, Cairo, Egypt
Hany M. Harb
Systems and Computers Engineering Department, Al-Azhar University, Cairo, Egypt

Abstract


Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.

Keywords


Asymmetric cryptography, PKI, IBC, CL-PKC, Certificate, Key Escrow, Revocation.