Identity-based encryption: Difference between revisions

Content deleted Content added
Removing notice of move discussion
Line 24:
In order for the whole system to work, one has to postulate that:
 
:<math> \forall m \in \mathcal{M}, ID \in \left\{0,1\right\}^*: \mathrm{Decrypt}\left(\mathrm{Extract}\left(\mathcal{P}, K_m, ID\right), \mathcal{P}, \mathrm{Encrypt}\left(\mathcal{P}, m, ID \right) \right) = m </math>
 
==Encryption schemes==