Advertisement

Identity-Based Key Agreement

  • Colin Boyd
  • Anish Mathuria
  • Douglas Stebila
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

Identity-based public key cryptography was first proposed by Shamir in 1984 [665]. The idea is to avoid the need for public key certificates by making the public key publicly computable from the identification information of the owner. The identification information can include any desired fields such as real name, physical description or identification numbers. Identity-based cryptography avoids the difficulty of having to distribute public keys and thus avoids the need for a public key infrastructure, although parties still need to obtain and manage private keys.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Authors and Affiliations

  • Colin Boyd
    • 1
  • Anish Mathuria
    • 2
  • Douglas Stebila
    • 3
  1. 1.Department of Information Security and Communication TechnologyNorwegian University of Science and TechnologyTrondheimNorway
  2. 2.Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)GandhinagarIndia
  3. 3.Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooCanada

Personalised recommendations