Identity-based key infrastructures (IKI)

11Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Kohnfelder realized in 1978 that public key schemes require a Public Key Infrastructure (PKI). X500/X509 were set up to standardize these ideas. PGP, proposed by Zimmermann is an alternative to the original PKI idea, Variants of the PGP based PKI were discussed independently by Reiter-Stubblebine and Burmester-Desmedt-Kabatianskii. The goal of Shamir's 1984 idea of "identity-based" cryptography was to avoid a Public Key Infrastructure. Instead of having the users have their own public key, the identity of the user is the "public key", and a trusted center provides each party with a secret key. Several identitybased cryptosystems have been proposed, in particular recently. We analyze Shamir's identity-based concept critically. We argue the need for at least a registration infrastructure, which we call a basic Identity-based Key Infrastructure. Moreover, if secret keys of users can be stolen or lost, the infrastructure required to deal with this is as complex as the one of PKI. We make further comparisons between public key systems and identity-based ones. © 2004 by Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Desmedt, Y., & Burmester, M. (2004). Identity-based key infrastructures (IKI). In IFIP Advances in Information and Communication Technology (Vol. 147, pp. 167–176). Springer New York LLC. https://doi.org/10.1007/1-4020-8143-x_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free