Identity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards for Identity-based encryption procedures and their application. Properties such as needing a trusted third party to generate the private keys might hinder its adoption. There are initial solutions to optimize away or mitigate such negative features for many applications, but they are not yet well-tested and still subject to research. However, for application areas where a trusted third party for private key escrow is acceptable, for example, in government and enterprise applications or public safety and mission-critical applications, Identity-based encryption can be an exciting technology that simplifies key management and handling.
CITATION STYLE
Tellenbach, B. (2023). Identity-based cryptography. In Trends in Data Protection and Encryption Technologies (pp. 59–64). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_12
Mendeley helps you to discover research relevant for your work.