Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A course in number theory and cryptography
A course in number theory and cryptography
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Java cryptography
Elliptic curves in cryptography
Elliptic curves in cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Java implementation of an elliptic curve cryptosystem
PPPJ '02/IRE '02 Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Practical Cryptography
Elliptic Curves: Number Theory and Cryptography
Elliptic Curves: Number Theory and Cryptography
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Redactable signatures for independent removal of structure and content
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Hi-index | 0.00 |
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement the abstract mathematical concepts underlying this system. We reuse an existing Elliptic curve arithmetic API, [4] to reduce the development time of the IBE system. We present a Java Cryptographic Architecture (JCA) integrated implementation of IBE that will allow Java developers to easily take advantage of this new encryption system and thus eliminate some of the most serious practical problems associated with existing public key infrastructure systems. The JCA implementation facilitates the hiding of all the complicated mathematical details of the system and further demonstrates the utility of Java as security development language.