Identity-based encryption: Difference between revisions

Content deleted Content added
No edit summary
Imran (talk | contribs)
No edit summary
Line 4:
its secret.
 
 
When signing or decrypting the system is essentially the same as conventional private-key cryptography, however to perform signature verification and to sign a message the user uses their private key, but to verify the signature or encrypt a message only the identity information and the third partiy's public information is needed.
 
WhenTo signingdecrypt or decrypting the system is essentially the same as conventional private-key cryptography, however to perform signature verification and to sign a message the user uses their private key like with normal public key cryptography, but to verify the signature or encrypt a message only the identity information and the third partiy's public information is needed.
 
Originally when this system was first developed in 1984 by [[Adi Shamir]] it could only be used for keys for digital signatures, however recently this method has been extended to cryptography.