Abstract: Public key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key are mathematically linked. Public key Cryptography system uses different cryptographic techniques for encryption and decryption. Survey five techniques and analyzed the performance. Technique includes Public Key Infrastructure, Identity Based Cryptography, Certificateless Cryptography, Certificate Based Cryptography, Attribute Based Cryptography.
Keywords: Infrastructure, Identity Based Cryptography, Certificate based cryptography, Attribute Based Encryption