IBE (Identity-Based Encryption)
Craig Gentry, DoCoMo USA Labs
The Development of Practical Identity-Based Schemes
IBC versus Public Key Cryptography
IBE versus Certificate-Based Encryption and Certificateless PKE
The Guillou–Quisquater IBS Scheme
Cocks's Identity-Based Encryption Scheme
Identify-Based Encryption Using Pairings
Mathematical Background (on Pairings)
Previous Uses of Pairings in Cryptography
Pairing-Based IBE Without Random Oracles
Hierarchical Identity-Based Encryption
More Than Just Identities: Extending Identity-Based Cryptography
Signature-Contingent Decryption
Conclusions and Further Reading
INTRODUCTION
Adi Shamir, co-inventor of the first public key cryptosystem (RSA), introduced the notion of identity-based cryptography (IBC) in 1984 as a way to simplify public key infrastructure (PKI) (Shamir, 1985). (See chapter 57 of this Handbook for a review of public key infrastructure.) His idea, at a high level, is simple and elegant: if public keys did not need to be distributed—if, instead, all public keys in the system were somehow known to all users—then much of the infrastructure needed to support public key cryptography (e.g., ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.