Identity-based cryptography: Difference between revisions

Content deleted Content added
some unique information about the identity -> some unique information closely related to the identity
No edit summary
Line 1:
'''Identity-based cryptography''' is a type of [[public-key cryptography]] in which the [[public key]] of a userpublicly isknown somestring uniquerepresenting informationan closelyindividual relatedor toorganization thecould identitybe ofused the user (e.g.as a user's[[public email address)key]]. The Thispublic canstring usecould theinclude text-valuean ofemail the name oraddress, ___domain name, asor a key or the physical IP address it translates to.
 
The first implementation of identity-based signatures and an email-address based PKI was developed by [[Adi Shamir]] in 1984<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref>, which allowed users to verify [[digital signatures]] using only public information such as the user's identifier.
 
The first implementation of identity-based signatures and an email-address based PKI was developed by [[Adi Shamir]] in 1984<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref>, which allowed users to verify [[digital signatures]] using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity.
 
In 2001, Boneh and Franklin devised the first practical implementation of such an Identity-Based Encryption scheme/<ref>{{cite publisher |
author = Dan Boneh and Matt Franklin | title = Identity-based encryption from the Weil pairing | work = Lecture Notes in Computer Science}}</ref>
 
==Usage==
Line 12 ⟶ 13:
 
==References==
{{Reflist}}
<references />
 
[[Category:Cryptography]]