Application of Fuzzy Logic in Identity-Based Cryptography
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linnéuniversitetet, Institutionen för matematik (MA)
2014
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134 |
id |
ndltd-UPSALLA1-oai-DiVA.org-lnu-35134 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-lnu-351342018-06-21T06:00:00ZApplication of Fuzzy Logic in Identity-Based CryptographyengBulanık Mantığın Kimlik Tabanlı Kriptografide KullanımıOdyurt, UrazLinnéuniversitetet, Institutionen för matematik (MA)2014CryptographyFuzzy logicIdentity-Based Encryption (IBE)Fuzzy Identity-Based Encryption (FIBE)Selective-ID modelEncryption schemeKriptografiBulanık mantıkKimlik Tabanlı ŞifrelemeBulanık Kimlik Tabanlı ŞifrelemeSeçici-ID modeliŞifreleme şemasıMathematicsMatematikThis work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Cryptography Fuzzy logic Identity-Based Encryption (IBE) Fuzzy Identity-Based Encryption (FIBE) Selective-ID model Encryption scheme Kriptografi Bulanık mantık Kimlik Tabanlı Şifreleme Bulanık Kimlik Tabanlı Şifreleme Seçici-ID modeli Şifreleme şeması Mathematics Matematik |
spellingShingle |
Cryptography Fuzzy logic Identity-Based Encryption (IBE) Fuzzy Identity-Based Encryption (FIBE) Selective-ID model Encryption scheme Kriptografi Bulanık mantık Kimlik Tabanlı Şifreleme Bulanık Kimlik Tabanlı Şifreleme Seçici-ID modeli Şifreleme şeması Mathematics Matematik Odyurt, Uraz Application of Fuzzy Logic in Identity-Based Cryptography |
description |
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions. |
author |
Odyurt, Uraz |
author_facet |
Odyurt, Uraz |
author_sort |
Odyurt, Uraz |
title |
Application of Fuzzy Logic in Identity-Based Cryptography |
title_short |
Application of Fuzzy Logic in Identity-Based Cryptography |
title_full |
Application of Fuzzy Logic in Identity-Based Cryptography |
title_fullStr |
Application of Fuzzy Logic in Identity-Based Cryptography |
title_full_unstemmed |
Application of Fuzzy Logic in Identity-Based Cryptography |
title_sort |
application of fuzzy logic in identity-based cryptography |
publisher |
Linnéuniversitetet, Institutionen för matematik (MA) |
publishDate |
2014 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134 |
work_keys_str_mv |
AT odyurturaz applicationoffuzzylogicinidentitybasedcryptography AT odyurturaz bulanıkmantıgınkimliktabanlıkriptografidekullanımı |
_version_ |
1718699054774353920 |