Application of Fuzzy Logic in Identity-Based Cryptography

This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'...

Full description

Bibliographic Details
Main Author: Odyurt, Uraz
Format: Others
Language:English
Published: Linnéuniversitetet, Institutionen för matematik (MA) 2014
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134
id ndltd-UPSALLA1-oai-DiVA.org-lnu-35134
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-lnu-351342018-06-21T06:00:00ZApplication of Fuzzy Logic in Identity-Based CryptographyengBulanık Mantığın Kimlik Tabanlı Kriptografide KullanımıOdyurt, UrazLinnéuniversitetet, Institutionen för matematik (MA)2014CryptographyFuzzy logicIdentity-Based Encryption (IBE)Fuzzy Identity-Based Encryption (FIBE)Selective-ID modelEncryption schemeKriptografiBulanık mantıkKimlik Tabanlı ŞifrelemeBulanık Kimlik Tabanlı ŞifrelemeSeçici-ID modeliŞifreleme şemasıMathematicsMatematikThis work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Cryptography
Fuzzy logic
Identity-Based Encryption (IBE)
Fuzzy Identity-Based Encryption (FIBE)
Selective-ID model
Encryption scheme
Kriptografi
Bulanık mantık
Kimlik Tabanlı Şifreleme
Bulanık Kimlik Tabanlı Şifreleme
Seçici-ID modeli
Şifreleme şeması
Mathematics
Matematik
spellingShingle Cryptography
Fuzzy logic
Identity-Based Encryption (IBE)
Fuzzy Identity-Based Encryption (FIBE)
Selective-ID model
Encryption scheme
Kriptografi
Bulanık mantık
Kimlik Tabanlı Şifreleme
Bulanık Kimlik Tabanlı Şifreleme
Seçici-ID modeli
Şifreleme şeması
Mathematics
Matematik
Odyurt, Uraz
Application of Fuzzy Logic in Identity-Based Cryptography
description This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.
author Odyurt, Uraz
author_facet Odyurt, Uraz
author_sort Odyurt, Uraz
title Application of Fuzzy Logic in Identity-Based Cryptography
title_short Application of Fuzzy Logic in Identity-Based Cryptography
title_full Application of Fuzzy Logic in Identity-Based Cryptography
title_fullStr Application of Fuzzy Logic in Identity-Based Cryptography
title_full_unstemmed Application of Fuzzy Logic in Identity-Based Cryptography
title_sort application of fuzzy logic in identity-based cryptography
publisher Linnéuniversitetet, Institutionen för matematik (MA)
publishDate 2014
url http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134
work_keys_str_mv AT odyurturaz applicationoffuzzylogicinidentitybasedcryptography
AT odyurturaz bulanıkmantıgınkimliktabanlıkriptografidekullanımı
_version_ 1718699054774353920