Identity-based cryptography: Difference between revisions

Content deleted Content added
m Reverting possible vandalism by 117.239.191.130 to version by Scottwh. False positive? Report it. Thanks, ClueBot NG. (1727130) (Bot)
Line 18:
 
==Usage==
Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the private key generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding '''master private key''' (referred to as ''master key''). Given the master public key, any party can compute a public key corresponding to the identity ''ID'' by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ''ID'' contacts the PKG, which uses the master private key to generate the private key for identity ''ID''.i think this concepty
 
==Limitation==