首页    期刊浏览 2024年09月18日 星期三
登录注册

文章基本信息

  • 标题:Public-Key Cryptography Techniques Evaluation
  • 本地全文:下载
  • 作者:Reham M. Abobeah, Mohamed M. Ezz, Hany M. Harb
  • 期刊名称:International Journal of Computer Networks and Applications (IJCNA)
  • 电子版ISSN:2395-0455
  • 出版年度:2015
  • 期号:3686
  • 页码:64-75
  • 出版社:EverScience Publications
  • 摘要:Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.
国家哲学社会科学文献中心版权所有