International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Public Key Encryption : A Survey

Banazir B

Public key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key are mathematically linked. Public key Cryptography system uses different cryptographic techniques for encryption and decryption. Survey five techniques and analyzed the performance. Technique includes Public Key Infrastructure, Identity Based Cryptography, Certificateless Cryptography, Certificate Based Cryptography, Attribute Based Cryptography.

Keywords: Infrastructure, Identity Based Cryptography, Certificate based cryptography, Attribute Based Encryption

Edition: Volume 2 Issue 6, June 2013

Pages: 287 - 290


How to Cite this Article?

Banazir B, "Public Key Encryption : A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013151, Volume 2 Issue 6, June 2013, 287 - 290

27 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Infrastructure'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 675 - 679

Design and Implementation of Audit Cloud for Consistency in Cloud Computing

D. Veerabhadraiah, M. Revathi

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 4, April 2020

Pages: 1517 - 1523

IT Infrastructure & Enterprise Applications - Organizations Strategy and Planning

Anshuman Awasthi

Share this article

Similar Articles with Keyword 'Identity Based Cryptography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 287 - 290

Public Key Encryption : A Survey

Banazir B

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this article

Similar Articles with Keyword 'Attribute Based Encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article

Top