Change search
CiteExportLink to record
Permanent link

Direct link
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Application of Fuzzy Logic in Identity-Based Cryptography
Linnaeus University, Faculty of Technology, Department of Mathematics.
2014 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesisAlternative title
Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı (Turkish)
Abstract [en]

This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.

Place, publisher, year, edition, pages
2014. , 34 p.
Keyword [en]
Cryptography, Fuzzy logic, Identity-Based Encryption (IBE), Fuzzy Identity-Based Encryption (FIBE), Selective-ID model, Encryption scheme
Keyword [tr]
Kriptografi, Bulanık mantık, Kimlik Tabanlı Şifreleme, Bulanık Kimlik Tabanlı Şifreleme, Seçici-ID modeli, Şifreleme şeması
National Category
URN: urn:nbn:se:lnu:diva-35134OAI: diva2:725347
Subject / course
Educational program
Applied Mahtematics Programme, 180 credits
Available from: 2014-06-16 Created: 2014-06-14 Last updated: 2014-06-16Bibliographically approved

Open Access in DiVA

fulltext(1812 kB)