UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 4 Issue 9
September-2017
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1709107


Registration ID:
313383

Page Number

719-722

Share This Article


Jetir RMS

Title

Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management

Abstract

The main purpose of this paper is to explore the concept of identity-based encryption which will focus on identity and access management to enterprise privacy. In today's society, data privacy is a very sensitive subject. Data may be stored or sent, encryption is a strong key component for the anonymity and protection of information [1]. It has two larger ranges: symmetric and asymmetric. Two keys for encrypting and decrypting are needed for asymmetric systems, whereas a single key for encryption and decryption is used in asymmetric systems. Identity-Based Encryption is a kind of asymmetric cryptography that is used to protect sensitive information. To simplify the certificate handling, the message is encrypted by arbitrary strings. The bulk of our communications are carried out online with the aid of amazing technological progress. This is why encryption is more essential than ever before. In today's world, we rely heavily on technological communications. For commercial and communication reasons, we transmit data, movies, images [1]. We communicate through internet services such as social networks and messaging applications. We're sending millions of emails, downloading lots of information. As a consequence, we place ourselves in a position of extreme vulnerability. If they take over our digital communications, hackers, malicious hackers or assailants may damage us. That is why we use a variety of cryptographic techniques to guarantee the security and integrity of our interactions [2]. Identity-Based Encryption is one of the most common types of encryption and provides comprehensive security for people and organizations. This article will examine in depth what identification-based encryption is and why many companies need it for security purposes.

Key Words

Identity-based encryption, encryption, decryption, Identity access management, Private Key Generator, Private key, Public key, ciphertext.

Cite This Article

"Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.4, Issue 9, page no.719-722, September-2017, Available :http://www.jetir.org/papers/JETIR1709107.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.4, Issue 9, page no. pp719-722, September-2017, Available at : http://www.jetir.org/papers/JETIR1709107.pdf

Publication Details

Published Paper ID: JETIR1709107
Registration ID: 313383
Published In: Volume 4 | Issue 9 | Year September-2017
DOI (Digital Object Identifier):
Page No: 719-722
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000582

Print This Page

Current Call For Paper

Jetir RMS