A systematic analysis of identity based encryption (IBE)

Author(s):  
Aravind Karrothu ◽  
Jasmine Norman

Light-weight cryptography is a major research area due to the minimization of the size of the devices utilized for such services. The associated security threats do increase as their applications are more now. Identity-Based Encryption (IBE) with its wide range of cryptographic schemes and protocols is specifically found suitable for low-end devices that have much resource constraint. This work describes various schemes and protocols in IBE. In this paper an analysis of IBE schemes and the various attacks they are prone to are discussed. The future trends are found to be very promising and challenging.

Author(s):  
Neyire Deniz Sarier

In this chapter, we evaluate the security properties and different applications of Identity Based Encryption (IBE) systems. Particularly, we consider biometric identities for IBE, which is a new encryption system defined as fuzzy IBE. Next, we analyze the security aspects of fuzzy IBE in terms of the security notions it must achieve and the prevention of collusion attacks, which is an attack scenario specific to fuzzy IBE. In this context, we present a new method that avoids the collusion attacks and describe the currently most efficient biometric IBE scheme that implements this new method. Also, we investigate implementation challenges for biometric IBE systems, where fuzzy IBE could be a potential cryptographic primitive for biometric smartcards. Due to the limited computational power of these devices, a different solution for biometric IBE is considered, which is the encryption analogue of the biometric identity based signature system of Burnett et al. (2007). Finally, we state the future trends for biometric IBE systems and conclude our results.


2019 ◽  
Vol 15 (7) ◽  
pp. 155014771986039 ◽  
Author(s):  
Baokang Zhao ◽  
Puguang Liu ◽  
Xiaofeng Wang ◽  
Ilsun You

Space-air-ground integrated Internet of things can improve the scope of Internet of things applications significantly by offering truly global coverage all over the world. While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. However, the intrinsical properties of network dynamics and wide coverage make the authentication concern in space-air-ground integrated Internet of things extremely challenging than traditional Internet of things networks. In this article, we propose MASIT, an identity-based efficient and lightweight mutual authentication scheme for space-air-ground integrated Internet of things. MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. Experimental results showed that, MASIT outperforms the existing identity-based encryption schemes significantly, that is, the signature verification time can be reduced by 50% to 60%, and the user signature size can be reduced by 13% to 50%.


Author(s):  
Aravind Karrothu ◽  
Jasmine Norman

Fog networking supports the internet of things (IoT) concept, in which most of the devices used by humans on a daily basis will be connected to each other. Security issues in fog architecture are still a major research area as the number of security threats increases every day. Identity-based encryption (IBE) has a wide range of new cryptographic schemes and protocols that are particularly found to be suitable for lightweight architecture such as IoT and wireless sensor networks. This chapter focuses on these schemes and protocols in the background of wireless sensor networks. Also, this chapter analyses identity-based encryption schemes and the various attacks they are prone to.


2013 ◽  
pp. 430-450 ◽  
Author(s):  
Jenny Torres ◽  
Michele Nogueira ◽  
Guy Pujolle

Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more practical and that consider the characteristics of emerging network paradigms, such as wireless communication, device constraints and mobility. Identity-Based Cryptography (IBC) is an asymmetric key cryptographic technology that employs as user’s public key any unique information related to the identity of the user. IBC efficiently manages keying material and provides an easy way to issue a pair of keys applying user information. However, it assumes the existence of a Trusted Third Party (TTP), called Private Key Generator (PKG), which is responsible for generating the corresponding user private key. Relying on a TTP and using an identity as the base of the scheme result in different weaknesses on the system, as the inherent key escrow problem. This chapter investigates those weaknesses, and it points out the stat-of-the-art of proposed solutions to avoid them. This chapter also provides an overview of Identity-Based Encryption (IBE), Identity-Based Signature (IBS) and Identity-Based Key Agreement (IBKA), emphasizing IBE due to being an open problem for many years. This chapter concludes highlighting IBC applications and future trends.


Author(s):  
Jenny Torres ◽  
Michele Nogueira ◽  
Guy Pujolle

Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more practical and that consider the characteristics of emerging network paradigms, such as wireless communication, device constraints and mobility. Identity-Based Cryptography (IBC) is an asymmetric key cryptographic technology that employs as user’s public key any unique information related to the identity of the user. IBC efficiently manages keying material and provides an easy way to issue a pair of keys applying user information. However, it assumes the existence of a Trusted Third Party (TTP), called Private Key Generator (PKG), which is responsible for generating the corresponding user private key. Relying on a TTP and using an identity as the base of the scheme result in different weaknesses on the system, as the inherent key escrow problem. This chapter investigates those weaknesses, and it points out the stat-of-the-art of proposed solutions to avoid them. This chapter also provides an overview of Identity-Based Encryption (IBE), Identity-Based Signature (IBS) and Identity-Based Key Agreement (IBKA), emphasizing IBE due to being an open problem for many years. This chapter concludes highlighting IBC applications and future trends.


Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

2020 ◽  
Vol 10 (3) ◽  
pp. 169-184
Author(s):  
Rachna Anand ◽  
Arun Kumar ◽  
Arun Nanda

Background: Solubility and dissolution profile are the major factors which directly affect the biological activity of a drug and these factors are governed by the physicochemical properties of the drug. Crystal engineering is a newer and promising approach to improve physicochemical characteristics of a drug without any change in its pharmacological action through a selection of a wide range of easily available crystal formers. Objective: The goal of this review is to summarize the importance of crystal engineering in improving the physicochemical properties of a drug, methods of design, development, and applications of cocrystals along with future trends in research of pharmaceutical co-crystals. Co-crystallization can also be carried out for the molecules which lack ionizable functional groups, unlike salts which require ionizable groups. Conclusion: Co-crystals is an interesting and promising research area amongst pharmaceutical scientists to fine-tune the physicochemical properties of drug materials. Co-crystallization can be a tool to increase the lifecycle of an older drug molecule. Crystal engineering carries the potential of being an advantageous technique than any other approach used in the pharmaceutical industry. Crystal engineering offers a plethora of biopharmaceutical and physicochemical enhancements to a drug molecule without the need of any pharmacological change in the drug.


Antibiotics ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 795
Author(s):  
Leticia Matilla-Cuenca ◽  
Alejandro Toledo-Arana ◽  
Jaione Valle

The choice of an effective therapeutic strategy in the treatment of biofilm-related infections is a significant issue. Amyloids, which have been historically related to human diseases, are now considered to be prevailing structural components of the biofilm matrix in a wide range of bacteria. This assumption creates the potential for an exciting research area, in which functional amyloids are considered to be attractive targets for drug development to dissemble biofilm structures. The present review describes the best-characterized bacterial functional amyloids and focuses on anti-biofilm agents that target intrinsic and facultative amyloids. This study provides a better understanding of the different modes of actions of the anti-amyloid molecules to inhibit biofilm formation. This information can be further exploited to improve the therapeutic strategies to combat biofilm-related infections.


Forests ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 327 ◽  
Author(s):  
Riccardo Dainelli ◽  
Piero Toscano ◽  
Salvatore Filippo Di Gennaro ◽  
Alessandro Matese

Natural, semi-natural, and planted forests are a key asset worldwide, providing a broad range of positive externalities. For sustainable forest planning and management, remote sensing (RS) platforms are rapidly going mainstream. In a framework where scientific production is growing exponentially, a systematic analysis of unmanned aerial vehicle (UAV)-based forestry research papers is of paramount importance to understand trends, overlaps and gaps. The present review is organized into two parts (Part I and Part II). Part II inspects specific technical issues regarding the application of UAV-RS in forestry, together with the pros and cons of different UAV solutions and activities where additional effort is needed, such as the technology transfer. Part I systematically analyzes and discusses general aspects of applying UAV in natural, semi-natural and artificial forestry ecosystems in the recent peer-reviewed literature (2018–mid-2020). The specific goals are threefold: (i) create a carefully selected bibliographic dataset that other researchers can draw on for their scientific works; (ii) analyze general and recent trends in RS forest monitoring (iii) reveal gaps in the general research framework where an additional activity is needed. Through double-step filtering of research items found in the Web of Science search engine, the study gathers and analyzes a comprehensive dataset (226 articles). Papers have been categorized into six main topics, and the relevant information has been subsequently extracted. The strong points emerging from this study concern the wide range of topics in the forestry sector and in particular the retrieval of tree inventory parameters often through Digital Aerial Photogrammetry (DAP), RGB sensors, and machine learning techniques. Nevertheless, challenges still exist regarding the promotion of UAV-RS in specific parts of the world, mostly in the tropical and equatorial forests. Much additional research is required for the full exploitation of hyperspectral sensors and for planning long-term monitoring.


Materials ◽  
2021 ◽  
Vol 14 (11) ◽  
pp. 2950
Author(s):  
Hongwei Song ◽  
Xinle Li

The most active research area is nanotechnology in cementitious composites, which has a wide range of applications and has achieved popularity over the last three decades. Nanoparticles (NPs) have emerged as possible materials to be used in the field of civil engineering. Previous research has concentrated on evaluating the effect of different NPs in cementitious materials to alter material characteristics. In order to provide a broad understanding of how nanomaterials (NMs) can be used, this paper critically evaluates previous research on the influence of rheology, mechanical properties, durability, 3D printing, and microstructural performance on cementitious materials. The flow properties of fresh cementitious composites can be measured using rheology and slump. Mechanical properties such as compressive, flexural, and split tensile strength reveal hardened properties. The necessary tests for determining a NM’s durability in concrete are shrinkage, pore structure and porosity, and permeability. The advent of modern 3D printing technologies is suitable for structural printing, such as contour crafting and binder jetting. Three-dimensional (3D) printing has opened up new avenues for the building and construction industry to become more digital. Regardless of the material science, a range of problems must be tackled, including developing smart cementitious composites suitable for 3D structural printing. According to the scanning electron microscopy results, the addition of NMs to cementitious materials results in a denser and improved microstructure with more hydration products. This paper provides valuable information and details about the rheology, mechanical properties, durability, 3D printing, and microstructural performance of cementitious materials with NMs and encourages further research.


Sign in / Sign up

Export Citation Format

Share Document