Application of Fuzzy Logic in Identity-Based Cryptography ; Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı

Saved in:
Bibliographic Details
Title: Application of Fuzzy Logic in Identity-Based Cryptography ; Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı
Authors: Odyurt, Uraz
Publisher Information: Linnéuniversitetet, Institutionen för matematik (MA)
Publication Year: 2014
Collection: Linnaeus University Kalmar Växjö: Publications
Subject Terms: Cryptography, Fuzzy logic, Identity-Based Encryption (IBE), Fuzzy Identity-Based Encryption (FIBE), Selective-ID model, Encryption scheme, Kriptografi, Bulanık mantık, Kimlik Tabanlı Şifreleme, Bulanık Kimlik Tabanlı Şifreleme, Seçici-ID modeli, Şifreleme şeması, Mathematics, Matematik
Description: This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.
Document Type: bachelor thesis
File Description: application/pdf
Language: English
Availability: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134
Rights: info:eu-repo/semantics/openAccess
Accession Number: edsbas.C63B303B
Database: BASE
Description
Abstract:This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.