Content deleted Content added
m Whitespace |
m I hate references..... |
||
Line 3:
The first implementation of identity-based signatures and an email-address based PKI was developed by [[Adi Shamir]] in 1984<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref>, which allowed users to verify [[digital signatures]] using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity, with verification essentially the same as that required for issuing a certificate in a typical [[Public Key Infrastructure | Public Key Infrastructure (PKI)]].
In 2001, Boneh and Franklin devised the first practical implementation of such an Identity-Based Encryption scheme.<ref>
{{cite journal | | last1 = Dan | first1 = Boneh
| last2 = Matt | first2 = Franklin
| title = Identity-based encryption from the Weil pairing
| booktitle = Lecture Notes in Computer Science
| publisher = Springer
| work = Advances in Cryptology — CRYPTO 2001
| year=2001
| volume = 2139/2001 | pages = 213-229
| accessdate = 2010-08-26
| url = http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.66.1131&rep=rep1&type=pdf}}</ref>
==Usage==
|