Sciweavers

IACR
2011

Identity-Based Decryption

12 years 11 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notion of identity-based encryption (IBE). In contrast to public-key encryption (PKE), a user of IBE does not have a distinct public key. Rather, the user’s identity serves the role of public key. The user’s private key is created by some trusted authority. Boneh and Franklin proposed a practical identity-based encryption scheme [3, 4]. Some of the advantages of identity-based encryption over public-key encryption are: Less initialization: Alice can encrypt messages to Bob even if Bob does not yet have a private key. So, unlike in PKE, Bob does not have to be initialized into the system, that...
Daniel R. L. Brown
Added 23 Dec 2011
Updated 23 Dec 2011
Type Journal
Year 2011
Where IACR
Authors Daniel R. L. Brown
Comments (0)