Identity-based encryption: Difference between revisions

Content deleted Content added
m 2pou moved page ID-based encryption to Identity-based encryption without leaving a redirect: requested move; consensus at Talk:Identity-based encryption
Tag: Reverted
Removing notice of move discussion
Line 1:
</noinclude>'''ID-based encryption''', or '''identity-based encryption''' ('''IBE'''), is an important primitive of [[ID-based cryptography]]. As such it is a type of [[public-key encryption]] in which the [[public key]] of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user.
<noinclude>{{User:RMCD bot/subject notice|1=Identity-based encryption|2=Talk:ID-based encryption#Requested move 30 September 2020 }}
</noinclude>'''ID-based encryption''', or '''identity-based encryption''' ('''IBE'''), is an important primitive of [[ID-based cryptography]]. As such it is a type of [[public-key encryption]] in which the [[public key]] of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can encrypt a message using e.g. the text-value of the receiver's name or email address as a key. The receiver obtains its decryption key from a central authority, which needs to be trusted as it generates secret keys for every user.
 
ID-based encryption was proposed by [[Adi Shamir]] in 1984.<ref name="iseca.org">Adi Shamir, [http://www.iseca.org/modules/mydownloads/visit.php?cid=56&lid=33 Identity-Based Cryptosystems and Signature Schemes]. ''Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science'', 7:47--53, 1984</ref> He was however only able to give an instantiation of [[ID-based cryptography|identity-based signatures]]. Identity-based encryption remained an open problem for many years.