A performance analysis of identity-based encryption schemes

Pengqi Cheng,Yan Gu,Zihong Lv,Jianfei Wang,Wenlei Zhu,Zhen Chen,Jiwei Huang
DOI: https://doi.org/10.1007/978-3-642-32298-3_19
2012-01-01
Abstract:We implemented four of the most common IBE schemes: Cocks IBE, Boneh-Franklin IBE, Authenticated IBE, Hierarchical IBE. For each algorithm in an IBE scheme, we recorded the execution time and space cost with different lengths of key. Then, we made a comparison among these IBE schemes and analyzed their characteristics.
What problem does this paper attempt to address?