Cryptosystem permits any pair of users to establish a safe and secure communication channel and verify signatures without prior key exchange and maintaining a public key directory. This paper gives an overview of the literature on identity-based cryptography (IBC) schemes, from Shamir’s scheme to the current state-of-the-art. This paper discusses the variations of the identity based cryptosystem namely, modular arithmetic based, pairing based, and finally hierarchical ID based systems. The paper also, discusses the major implementations of identity based cryptography in each category, and concludes with applications and open challenges.
Author's Name: M.B. Smithamol
Volume: Volume 15
Issues: Issue 3
Keywords: Pairings, Random Oracle Model, Verification, Key Generator, Hierarchical Identity