Identity-based encryption: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 10:
Only limited work has been done in terms of formally analysing ID based cryptosystems, some of which have been recently broken.
 
Because any user's private key can be generated through the use of the third party's secret, this system has inherent [[key escrow]]. A number of variant systems have been proposed which remove the escrow including [[Certificatecertificate-based encryption]], [[secure key issuing cryptography]] and [[certificateless cryptography]].
 
One of this system's major advantages is that if there are only a finite number of users, after all users have been issued with keys the third party's secret can be destroyed. This can take place because this system assumes that, once issued, keys are always valid (as this basic system lacks an method of [[key revocation]]). The majority of derivatives of this system which have key revocation lose this advantage.