Content deleted Content added
mNo edit summary |
mNo edit summary |
||
Line 3:
The first implementation of identity-based signatures and an email-address based [[public-key infrastructure]] (PKI) was developed by [[Adi Shamir]] in 1984,<ref>Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref> which allowed users to verify [[digital signatures]] using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity, with verification essentially the same as that required for issuing a [[public-key certificate|certificate]] in a typical PKI.
Shamir similarly proposed [[identity
{{cite journal
|last1=Sakai|first1=R
|