Identity-based encryption: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 6:
To decrypt or sign a message the user uses their private key as with normal public key cryptography, but to verify the signature or encrypt a message only the identity information and the third party's public information is needed.
 
Originally when this system was developed in 1984 by [[Adi Shamir]] it could only be used for keys for digital signatures, but in 2001 the method was extended by [[Dan Boneh]] and [[Matthew K. Franklin]] to encryption/decryption through the use of [[Weil Pairingspairing]]s.
 
Only limited work has been done in terms of formally analysing ID based cryptosystems, some of which have been recently broken.