security

encyclopedia

identity based encryption

Using an identity ID (i.e. an email) computes a public key using the master public key from a Private Key Generator and the identity ID. It can use this computed public key to send encrypted messages to the person/entity associated with the identity ID. Using an identity ID (i.e. an email) computes a public key using the master public key from a Private Key Generator and the identity ID. It can use this computed public key to send encrypted messages to the person/entity associated with the identity ID.

Example:

“Federal agencies often use Identity Based Encryption for secure communications and e-mails. IBE is meant to reduce the complexity that is often associated with using Public-Key Cryptography.”

hypr_trial_ad
hypr_trial_ad