Talk:Identity-based encryption: Difference between revisions

Content deleted Content added
SineBot (talk | contribs)
m Signing comment by 109.28.114.45 - "What about Brent Waters work about this ?: new section"
Zosterae (talk | contribs)
No edit summary
Line 9:
 
The so-called advantage, "if there are only a finite number of users, after all users have been issued with keys the third party's secret can be destroyed" seems more like a mitigation of the drawback that the PKG has all the private keys rather than an actual advantage. [[Special:Contributions/87.253.81.146|87.253.81.146]] ([[User talk:87.253.81.146|talk]]) 16:12, 18 February 2010 (UTC)
 
I'm not competent to make changes to this page, but criticism above is repeated in the paper [http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf] (see the general criticism about the underplaying of the role of the PKG on page 19 and the specific mention of this wikipedia page in footnote 81 on page 20). [[User:Zosterae|Zosterae]] ([[User talk:Zosterae|talk]]) 20:55, 12 December 2015 (UTC)
 
= Sakai Kasahara =