ADA Library Digital Repository

Lattice-Based Identity-Based Encryption: Foundations, Constructions and Implementation

Show simple item record

dc.contributor.author Aghayev, Agha
dc.date.accessioned 2025-09-23T08:09:00Z
dc.date.available 2025-09-23T08:09:00Z
dc.date.issued 2025-04
dc.identifier.uri http://hdl.handle.net/20.500.12181/1480
dc.description.abstract Traditional public key encryption (PKE) is widely used over the internet and overcomes the key distribution problem. However, accessing the correct public keys of users still remain as a challenge. The Public Key Infrastructure (PKI) addresses this problem by managing the creation, distribution, secure storage of public keys, and their verification through trusted Certificate Authorities (CA). Moreover, Certificate Authorities can be corrupted and fake certificates can be issued. Identity-Based Encryption (IBE) solves this problem by generating secret keys from user identities, enabling any string — such as an email address, phone number, or other identifier to serve as a valid public key for a user. Additionally, it encompasses several advantages over traditional public key encryption, offering easier key revocation and flexibility for delegation of keys. Hence, this study focuses on examining the underlying mathematical foundations of Identity-Based Encryption (IBE) schemes and analyzing their structural properties. On the other hand, the recent developments in quantum computing pose a significant threat against contemporary cryptographic constructions, including PKE and IBE. This trend brings the necessity of developing quantum-resistant schemes, and Lattice-based cryptography has gained significant attention from researchers, as there is no known polynomial time algorithm to break its security. Additionally, operations on lattices are highly parallelizable and efficient, and more importantly, they offer strong worst-case security guarantees. Furthermore, our work focuses on the foundational principles of lattice-based cryptography and its application to Identity-Based Encryption (IBE) schemes. To understand the basic building blocks of lattice-based IBE schemes, we study two notions of trapdoor sampling - a critical step in lattice IBE construction. We implement two variants of lattice-based trapdoor sampling and experimentally evaluate their performances. en_US
dc.language.iso az en_US
dc.publisher ADA University en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject Quantum computers -- Security measures. en_US
dc.subject Lattice theory. en_US
dc.subject Computer security-- Mathematics. en_US
dc.subject Digital communications -- Security measures. en_US
dc.subject Cryptography. en_US
dc.title Lattice-Based Identity-Based Encryption: Foundations, Constructions and Implementation en_US
dc.type Thesis en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search ADA LDR


Advanced Search

Browse

My Account