64 - 75
Public-Key Cryptography Techniques Evaluation
Authors: Reham M. Abobeah, Mohamed M. Ezz, Hany M. Harb
Number of views: 358
Cryptography techniques play an important role in
modern world. The purpose of such techniques is to ensure the
contents being unreadable to anyone except for parties who
agreed to use some specific scheme. Moreover, current
cryptography techniques provide more sophisticated services,
such as message integrity, authentication, time stamping, and
many others. There are two main approaches for cryptography:
private-key cryptography and public-key cryptography (PKC).
In this paper we focus on PKC techniques giving a comparison
between three main techniques, namely, Public key
Infrastructure (PKI), Identity- Based Cryptography (IBC) and
Certificate less Public Key Cryptography (CL-PKC). In this
research, a brief definition, advantages and disadvantages and
analysis of main problem, namely, the revocation problem, are
introduced for the three techniques. Also, a variety of available
solutions to overcome the revocation problem in each technique
are highlighted. Finally, some common applications and schemes
for each technique are summarized.