Public Key Encryption : A Survey
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Public Key Encryption : A Survey

Banazir B

Public key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key are mathematically linked. Public key Cryptography system uses different cryptographic techniques for encryption and decryption. Survey five techniques and analyzed the performance. Technique includes Public Key Infrastructure, Identity Based Cryptography, Certificateless Cryptography, Certificate Based Cryptography, Attribute Based Cryptography.

Keywords: Infrastructure, Identity Based Cryptography, Certificate based cryptography, Attribute Based Encryption

Edition: Volume 2 Issue 6, June 2013

Pages: 287 - 290

Share this Article

How to Cite this Article?

Banazir B, "Public Key Encryption : A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013151, Volume 2 Issue 6, June 2013, 287 - 290

96 PDF Views | 78 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Infrastructure'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANET's

Umar I. Masumdar, N. S. Killarikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and It's Types in Mobile Network

Palak Jain

Share this Article

Similar Articles with Keyword 'Identity Based Cryptography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 287 - 290

Public Key Encryption : A Survey

Banazir B

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Similar Articles with Keyword 'Attribute Based Encryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2024 - 2027

Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds

Afsha Pathan, M. D. Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article
Top