Abstract
Blockchain is inventive technology that allows passing information without the need for third party or transaction cost. It offers solid properties such as decentralization, transparency, and immutability which make it desirable to adopt in sense of sharing data and maintain its security. However, with the emergence of blockchain technology, new issues have arisen with regards to security in the blockchain authentication and infrastructure. This paper focusing on understanding blockchain and what limitation and challenges adhered with it. Moreover, it reviews and analyzes the different authentication methods and discuss the integration of Identity-based encryption (IBE) and how does it differ than public key infrastructure (PKI) to determine the best method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Google Trends. https://trends.google.com/trends/explore?date=all&q=blockchain. Accessed 31 Mar 2019
Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, p. 9
Niranjanamurthy, M., Nithya, B.N., Jagannatha, S.: Analysis of blockchain technology: pros, cons and SWOT. Clust. Comput. (2018)
Liu, L., Xu, B.: Research on information security technology based on blockchain. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 380–384 (2018)
Esposito, C., Santis, A.D., Tortora, G., Chang, H., Choo, K.R.: Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5(1), 31–37 (2018)
Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K.: Where is current research on blockchain technology?—a systematic review. PLoS ONE 11, e0163477 (2016)
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. (2017)
Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–238 (2015)
Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., SantamarÃa, V.: To blockchain or not to blockchain: that is the question. IT Prof. 20(2), 62–74 (2018)
Dai, F., Shi, Y., Meng, N., Wei, L., Ye, Z.: From bitcoin to cybersecurity: a comparative study of blockchain application and security issues. In: 2017 4th International Conference on Systems and Informatics (ICSAI), pp. 975–979 (2017)
Kuhn, D.R., Hu, V., Polk, W.T., Chang, S.H.: SP 800-32 introduction to public key technology and the federal PKI infrastructure. National Institute of Standards & Technology, Gaithersburg, MD, United States (2001)
Yakubov, A., Shbair, W.M., Wallbom, A., Sanda, D., State, R.: A blockchain-based PKI management framework. In: NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, pp. 1–6 (2018)
Zheng, Z., Xie, S., Wang, H.: Blockchain challenges and opportunities : a survey (2018)
Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B., Shi, W.: Cecoin: a decentralized PKI mitigating MitM attacks. Future Gener. Comput., Syst (2017)
Axon, L.: Privacy-awareness in blockchain-based PKI, p. 18
Fromknecht, C., Yakoubov, S.: CertCoin: a namecoin based decentralized authentication system 6.857 class project, p. 19
Fromknecht, C., Velicanu, D., Yakoubov, S.: A decentralized public key infrastructure with identity retention. IACR Cryptol. ePrint Arch. 2014, 803 (2014)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Wang, H., Song, Y.: Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J. Med. Syst. 42(8), 152 (2018)
Chaieb, M., Yousfi, S., Lafourcade, P., Robbana, R.: Verify-Your-Vote: a verifiable blockchain-based online voting protocol. In: Themistocleous, M., Rupino da Cunha, P. (eds.) EMCIS 2018. LNBIP, vol. 341, pp. 16–30. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11395-7_2
Paterson, K.G., Price, G.: A comparison between traditional public key infrastructures and identity-based cryptography. Inf. Secur. Tech. Rep. 8(3), 57–72 (2003)
Bai, Q.: Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE). In: CSQRWC 2012, pp. 147–150 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alharbi, L., Aljeaid, D. (2019). A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1097. Springer, Cham. https://doi.org/10.1007/978-3-030-36365-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-36365-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36364-2
Online ISBN: 978-3-030-36365-9
eBook Packages: Computer ScienceComputer Science (R0)