Content deleted Content added
some unique information about the identity -> some unique information closely related to the identity |
No edit summary |
||
Line 1:
'''Identity-based cryptography''' is a type of [[public-key cryptography]] in which
The first implementation of identity-based signatures and an email-address based PKI was developed by [[Adi Shamir]] in 1984<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref>, which allowed users to verify [[digital signatures]] using only public information such as the user's identifier.▼
▲The first implementation of identity-based signatures and an email-address based PKI was developed by [[Adi Shamir]] in 1984<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref>, which allowed users to verify [[digital signatures]] using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity.
In 2001, Boneh and Franklin devised the first practical implementation of such an Identity-Based Encryption scheme/<ref>{{cite publisher |
author = Dan Boneh and Matt Franklin | title = Identity-based encryption from the Weil pairing | work = Lecture Notes in Computer Science}}</ref>
==Usage==
Line 12 ⟶ 13:
==References==
{{Reflist}}
[[Category:Cryptography]]
|