Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm
DOI:
https://doi.org/10.59934/jaiea.v4i3.1129Keywords:
Bounded collusion, Identity Based Encryption, Identity Encryption, Visual BasicAbstract
This research aims to design and develop an identity encryption application using the bounded collusion method with the implementation of the Identity Based Encryption (IBE) algorithm. The method combines IBE, bounded collusion, and key generation based on the user's email. The application was developed using Visual Basic. In its implementation, the application can perform text encryption and decryption while limiting the number of decryptions to a maximum of two times per identity, in accordance with the bounded collusion principle. The testing results show that the application effectively protects user identities by generating unique keys based on email and restricting potential collusion attacks between users. Therefore, the implementation of bounded collusion and IBE is proven to enhance the security of identity-based encryption processes
Downloads
References
Dewan Teknologi dan Komunikasi Nasional, “Pengembangan keamanan siber nasional,” Policy Paper, 2018.
J. S. Pasaribu, “Penerapan Algoritma Hill Chiper Dalam Pengamanan Data Dengan Teknik Enkripsi Dan Dekripsi,” in Seminar Nasional Telekomunikasi dan Informatika, 2016..
W. Wardiana and P. Informatika-LIPI, “Pencegah Pembajakan Perangkat Lunak dengan Menggunakan Teknik Identity-Based Encryption dan Obfuscation,” Pencegah Pembajakan Perangkat Lunak dengan Menggunakan Teknik Identity-Based Encryption dan Obfuscation, 2009.
G. Itkis, E. Shen, M. Varia, D. Wilson, and A. Yerukhimovich, “Bounded-collusion attribute-based encryption from minimal assumptions,” in Lecture Notes in Computer Science, vol. 10401, pp. 61–89, 2017, doi: 10.1007/978-3-662-54388-7_3..
R. Garg, R. Goyal, G. Lu, and B. Waters, “Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption,” in Lecture Notes in Computer Science, vol. 13276, pp. 655–685, 2022, doi: 10.1007/978-3-031-07085-3_25.
M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, 2022, doi: 10.47709/jpsk.v2i01.1390.
A. K. Harsa, “Keamanan Data dengan Menggunakan Algoritma Rivest Code 4 (RC4) dan Steganografi pada Citra Digital,” Informatika Mulawarman, Feb. 2014.
P. Ananth and V. Vaikuntanathan, “Optimal Bounded-Collusion Secure Functional Encryption,” in Lecture Notes in Computer Science, vol. 11478, pp. 489–518, 2019, doi: 10.1007/978-3-030-36030-6_8.
S. D. Nurcahya, “Implementasi Aplikasi Kriptografi Metode Kode Geser Berbasis Java,” *J. Nas. Komputasi dan Teknol. Inf.*, vol. 5, no. 4, pp. 694–697, 2022, doi: 10.32672/jnkti.v5i4.4690.
N. A. Nanda, S. M. S. Silalahi, D. F. Nasution, M. Sari, and I. Gunawan, “Kriptografi dan Penerapannya Dalam Sistem Keamanan Data,” *J. Media Inform.*, vol. 4, no. 2, pp. 90–93, 2023, doi: 10.55338/jumin.v4i2.428.
Univ_medanarea@uma.ac.id, “Perbedaan Simetris dan Asimetris,” *WordPress*. [Online]. Available: https://p2mbim.uma.ac.id/2023/01/07/perbedaan-simetris-dan-asimetris/
P. Liu, “Public-key encryption secure against related randomness attacks for improved end-to-end security of cloud/Edge computing,” *IEEE Access*, 2020, doi: 10.1109/ACCESS.2020.2967457.
Y. Anshori, A. Y. E. Dodu, and D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” *Techno.Com*, vol. 18, no. 2, 2019, doi: 10.33633/tc.v18i2.2166.
E. A. Adeniyi, P. B. Falola, M. S. Maashi, M. Aljebreen, and S. Bharany, “Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions,” *Inf.*, vol. 13, no. 10, 2022, doi: 10.3390/info13100442.
Y. Yan, “The Overview of Elliptic Curve Cryptography (ECC),” in *J. Phys.: Conf. Ser.*, vol. 2386, no. 1, 2022, doi: 10.1088/1742-6596/2386/1/012019.
R. M. Simbolon, “Perancangan Perangkat Lunak Enkripsi Pesan dengan Metode Paillier Cryptosystem,” *Pelita Inform. Budi Darma*, 2013.
D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” *SIAM J. Comput.*, vol. 32, no. 3, pp. 586–615, 2003, doi: 10.1137/S0097539701398521.
A. Lewko, A. Sanais, and B. Waters, “Revocation systems with very small private keys,” in *Proc. IEEE Symp. Security and Privacy*, 2010, doi: 10.1109/SP.2010.23.
A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in *Lect. Notes Comput. Sci.*, vol. 6632, pp. 568–588, 2011, doi: 10.1007/978-3-642-20465-4_31.
D. J. Bernstein, “ChaCha, a variant of Salsa20,” *Work. Rec. SASC*, 2008.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.