Content deleted Content added
punc |
→top: decap |
||
Line 28:
|first = Cliff
|title = Cryptography and Coding
|journal = Lecture Notes in Computer Science
|year = 2001
Line 44:
}}</ref><ref>{{cite web|archive-url=https://web.archive.org/web/20150627063023/http://www.bristol.ac.uk/pace/graduation/honorary-degrees/hondeg08/cocks.html|archive-date=2015-06-27|url=http://www.bristol.ac.uk/pace/graduation/honorary-degrees/hondeg08/cocks.html|publisher=University of Bristol|title=Dr Clifford Cocks CB, Honorary Doctor of Science}}</ref>
Closely related to various identity-based encryption schemes are identity based key agreement schemes. One of the first identity based key agreement algorithms was published in 1986, just two years after Shamir's identity based signature. The author was E. Okamoto.<ref>{{Cite journal|last=Okamoto|first=E.|date=1986|title=Proposal for identity-based key distribution systems|journal=Electronics Letters|volume=22|issue=24|pages=1283–1284|doi=10.1049/el:19860880|bibcode=1986ElL....22.1283O|issn=0013-5194}}</ref> Identity
==Usage==
|