Analysis of broadcast schemes that implement identity-based encryption algorithms
In the context of an unsecure transmission channel, identity-based cryptography makes it possible to implement broadcast data transfer for a large number of recipients much more effective than classical public-key cryptography. A comparative analysis of such schemes is carried out and recommendation...
Gespeichert in:
Veröffentlicht in: | Automatic control and computer sciences 2015-12, Vol.49 (8), p.790-797 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In the context of an unsecure transmission channel, identity-based cryptography makes it possible to implement broadcast data transfer for a large number of recipients much more effective than classical public-key cryptography. A comparative analysis of such schemes is carried out and recommendations on selecting a particular scheme based on the system requirements (whether it is a public or private system, how often and how the group of recipients and security level changes, etc.) are provided. |
---|---|
ISSN: | 0146-4116 1558-108X |
DOI: | 10.3103/S014641161508009X |