A performance analysis of identity-based encryption schemes

  • Authors:
  • Pengqi Cheng;Yan Gu;Zihong Lv;Jianfei Wang;Wenlei Zhu;Zhen Chen;Jiwei Huang

  • Affiliations:
  • Tsinghua University, Beijing, China;Tsinghua University, Beijing, China;Tsinghua University, Beijing, China;Tsinghua University, Beijing, China;Tsinghua University, Beijing, China;Tsinghua University, Beijing, China;Tsinghua University, Beijing, China

  • Venue:
  • INTRUST'11 Proceedings of the Third international conference on Trusted Systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We implemented four of the most common IBE schemes: Cocks IBE, Boneh-Franklin IBE, Authenticated IBE, Hierarchical IBE. For each algorithm in an IBE scheme, we recorded the execution time and space cost with different lengths of key. Then, we made a comparison among these IBE schemes and analyzed their characteristics.