Identity-based encryption: Difference between revisions

Content deleted Content added
No edit summary
Protocol framework: there are no pages for that
Line 89:
[[Dan Boneh]] and [[Matthew K. Franklin]] defined a set of four algorithms that form a complete IBE system:
* '''Setup''': This algorithm is run by the PKG one time for creating the whole IBE environment. The master key is kept secret and used to derive users' private keys, while the system parameters are made public. It accepts a [[security parameter]] <math>\textstyle k</math> (i.e. binary length of key material) and outputs:
# A set <math>\textstyle \mathcal{P}</math> of system parameters, including the [[message space]] and [[ciphertext space]] <math>\textstyle \mathcal{M}</math> and <math>\textstyle \mathcal{C}</math>,
# a master key <math>\textstyle K_m</math>.