A Performance Analysis of Identity-Based Encryption Schemes
We implemented four of the most common IBE schemes: Cocks IBE, Boneh-Franklin IBE, Authenticated IBE, Hierarchical IBE. For each algorithm in an IBE scheme, we recorded the execution time and space cost with different lengths of key. Then, we made a comparison among these IBE schemes and analyzed their characteristics.
KeywordsIdentity-Based Encryption (IBE) performance time complexity execution time space cost
Unable to display preview. Download preview PDF.