Identity-based encryption: Difference between revisions

Content deleted Content added
No edit summary
Intro: Removed information too specialized for the intro part
Line 3:
The first implementation of an email-address based PKI was developed by [[Adi Shamir]] in 1984,<ref name="iseca.org">Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref> which allowed users to verify [[digital signature]]s using only public information such as the user's identifier.
 
ID-based encryption was proposed by [[Adi Shamir]] in 1984.<ref name="iseca.org"/> He was however only able to give an instantiation of [[ID-based cryptography|identity-based signatures]]. Identity-based encryption remained an open problem for many years. One example of the research leading up to identity-based encryption is provided in Maurer.<ref>Ueli M. Maurer: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. CRYPTO 1992: 461-470</ref>
 
The [[pairing-based cryptography|pairing]]-based [[Boneh–Franklin scheme]]<ref>Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing ''Advances in Cryptology - Proceedings of CRYPTO 2001'' (2001)</ref> and [[Cocks IBE scheme|Cocks's encryption scheme]]<ref>Clifford Cocks, [http://groups.csail.mit.edu/cis/crypto/classes/6.876/papers/cocks-IBE.pdf An Identity Based Encryption Scheme Based on Quadratic Residues], ''Proceedings of the 8th IMA International Conference on Cryptography and Coding'', 2001</ref> based on [[quadratic residue]]s both solved the IBE problem in 2001.