Identity-based encryption is an alternative to public-key cryptography in which primitive ID-based private keys are employed for securing communication. In the identity-based encryption model, the sender encrypts the ID based on the public keys, and the receiver can decrypt the ID using the secret key obtained from a centralized server. An identity-based encryption scheme plays an important role in securing communications among IoT users. The IoT users explore an identity-based private key for data encryption
An identity-based encryption scheme is developed to solve the issues in conventional public-key cryptography schemes. It explores the personal attributes of the IoT device, such as phone numbers, email addresses, register numbers as public keys. It helps diminish the difficulty of providing digital certificates in large-scale networks. An efficient identity-based encryption work should satisfy (i) anonymity of IoT devices; (ii) identity-based signature for data integrity; and (iii) performance merits of such identity-based schemes over other cryptographic tools. The major advantage of using identity-based encryption on IoT is that there are only limited users. It neglects the key distribution process of public key infrastructure. The public keys are secured with implicit authentication.