Identity-based cryptography: Difference between revisions

Content deleted Content added
L98172 (talk | contribs)
Added in the original Sakai scheme and reference
Yobot (talk | contribs)
m WP:CHECKWIKI errror fixes using AWB (10067)
Line 3:
The first implementation of identity-based signatures and an email-address based [[public-key infrastructure]] (PKI) was developed by [[Adi Shamir]] in 1984,<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref> which allowed users to verify [[digital signatures]] using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity, with verification essentially the same as that required for issuing a [[public-key certificate|certificate]] in a typical PKI.
 
Shamir similarly proposed identity-based encryption, which appeared particularly attractive since there was no need to acquire an identity's public key prior to encryption. However, he was unable to come up with a concrete solution, and identity-based encryption remained an open problem for many years. The first practical implementations were finally devised by Sakai in 2000,<ref>
{{cite journal
|last1=Sakai|first1=R
Line 10:
|title=Cryptosystems based on pairings
|journal=SICS
|dateyear=2000
|series=Symposium on cryptography and information security}}
</ref>, and Boneh and Franklin in 2001.<ref>
{{cite journal
| last1 = Dan | first1 = Boneh
Line 24:
| accessdate = 2010-08-26
| id = {{citeseerx|10.1.1.66.1131}}
}}</ref>. These solutions were based on [[pairing|bilinear pairings]]. Also in 2001, a solution was developed independently by Cocks.<ref>
{{cite journal
|last=Cocks |first=Cliff
|title=An Identity Based Encryption Scheme Based on Quadratic Residues
|journal=Lecture Notes in Computer Science
|dateyear=2001
|volume=2260/2001
|series=Institute of Mathematics and Its Applications International Conference on Cryptography and Coding – Proceedings of IMA 2001
|pages=360-363360–363
|url=. http://www.cesg.gov.uk/site/ast/idpkc/media/ciren.pdf|publisher=Springer}}</ref>.
 
==Usage==