CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Identifier-Based Encryption

Keith Harrison - HP Trusted Computing Lab

Jan 22, 2003

Abstract

We give a "notably different" approach to public key cryptography which
allows an arbitrary identifier, chosen by the sender rather than the
recipient, to be used as a public key, to which the private complement
can be generated (possibly after the encrypted message has been
received) by a third-party Trust Authority (also chosen by the
sender). Signature analogues also exist. We skip gazelle-like over
the details of the elliptic-curve-point-pairing basis for the more
computationally efficient variant, and concentrate on the contrast in
key management and key certification this approach has as compared with
RSA-based public key systems.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.