Identity-based cryptography: Difference between revisions

Content deleted Content added
m Reverting possible vandalism by 117.239.191.130 to version by Scottwh. False positive? Report it. Thanks, ClueBot NG. (1727130) (Bot)
L98172 (talk | contribs)
Line 22:
==Limitation==
Identity-based systems have a characteristic problem in operation. Suppose Alice and Bob are users of such a system. Since the information needed to find Alice's public key is completely determined by Alice's ID and the master public key, it is not possible to revoke Alice's credentials and issue new credentials without either (a) changing Alice's ID (usually a phone number or an email address which will appear in a corporate directory); or (b) changing the master public key and re-issusing private keys to all users, including Bob.
 
This limitation may be overcome by including a time component (e.g. the current month) in the identity.
 
==See also==