One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure that is shared among its users. Before secure communications can take place, both sender and receiver must generate encryption and signature keypairs, submit certificate requests along with proof of identity to a Certificate Authority (CA), and receive CA-signed certificates, which they can then use to authenticate one another and exchange encrypted messages. This process can be both time-consuming and error-prone, and is especially prohibitive for novice computer users. Frequently, individuals who can already receive encrypted email are still unable to send secure messages to others due to lack of preparedness, limited interoperability, device limitations or lack of technical competence on the receiving end. Given the need to communicate and the complexity of PKI-based cryptography, correspondence that could benefit from additional security is frequently conducted in the clear. Identity-based cryptography (IBC) seeks to reduce these barriers by requiring no preparation on the part of the message recipient. Although it provides some advantages over PKI-based approaches, it is not without its drawbacks.
[1]
Clifford C. Cocks.
An Identity Based Encryption Scheme Based on Quadratic Residues
,
2001,
IMACC.
[2]
Matthew K. Franklin,et al.
Identity-Based Encryption from the Weil Pairing
,
2001,
CRYPTO.
[3]
Joonsang Baek,et al.
A Survey of Identity-Based Cryptography
,
2004
.
[4]
Yacov Yacobi,et al.
A Note on the Bilinear Diffie-Hellman Assumption
,
2002,
IACR Cryptol. ePrint Arch..
[5]
Adi Shamir,et al.
Identity-Based Cryptosystems and Signature Schemes
,
1984,
CRYPTO.
[6]
Hovav Shacham,et al.
Short Signatures from the Weil Pairing
,
2001,
J. Cryptol..
[7]
Giuseppe Ateniese,et al.
Identity-Based Chameleon Hash and Applications
,
2004,
Financial Cryptography.