Advertisement

A Performance Analysis of Identity-Based Encryption Schemes

  • Pengqi Cheng
  • Yan Gu
  • Zihong Lv
  • Jianfei Wang
  • Wenlei Zhu
  • Zhen Chen
  • Jiwei Huang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7222)

Abstract

We implemented four of the most common IBE schemes: Cocks IBE, Boneh-Franklin IBE, Authenticated IBE, Hierarchical IBE. For each algorithm in an IBE scheme, we recorded the execution time and space cost with different lengths of key. Then, we made a comparison among these IBE schemes and analyzed their characteristics.

Keywords

Identity-Based Encryption (IBE) performance time complexity execution time space cost 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Cocks, C.: An identity based encryption scheme based on quadratic residues. In: IMA International Conference, pp. 360–363. Springer (2001)Google Scholar
  4. 4.
    Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Lynn, B.: Authenticated identity-based encryption. Cryptology ePrint Archive (2002)Google Scholar
  6. 6.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Pengqi Cheng
    • 1
  • Yan Gu
    • 1
  • Zihong Lv
    • 1
  • Jianfei Wang
    • 1
  • Wenlei Zhu
    • 1
  • Zhen Chen
    • 1
  • Jiwei Huang
    • 1
  1. 1.Tsinghua UniversityBeijingChina

Personalised recommendations