security

encyclopedia

O (1)

    identity based encryption

    Using an identity ID (i.e. an email) computes a public key using the master public key from a Private Key Generator and the identity ID. It can use this computed public key to send encrypted messages to the person/entity associated with the identity ID. Using an identity ID (i.e. an email) computes a public key using the master public key from a Private Key Generator and the identity ID. It can use this computed public key to send encrypted messages to the person/entity associated with the identity ID.

    Example:

    “Federal agencies often use Identity Based Encryption for secure communications and e-mails. IBE is meant to reduce the complexity that is often associated with using Public-Key Cryptography.”

    hypr_trial_ad
    hypr_trial_ad