Content deleted Content added
Nicely written. Removed one line suggesting that the Boneh-Franklin system is insecure. There are currently no attacks known on the BDH assumption. |
m Clean up -able suffix errors using AWB |
||
Line 4:
Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the [[Private Key Generator]] (PKG), generates the corresponding private keys. To operate, the PKG first publishes a "master" public key, and retains the corresponding master private key. Given the master public key, any party can compute a public key corresponding to the identity ''i'' by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ''i'' contacts the PKG, which uses the master private key to generate the private key for identity ''i''.
As a result, parties may encrypt messages (or verify signatures) with no prior distribution of keys between individual participants. This is extremely useful in cases where pre-distribution of authenticated keys is inconvenient or
==Encryption schemes==
|