Security

An Identity Based Aggregate Signature From Pairings

Free registration required

Executive Summary

In 1984, Shamir brought forward the concept of Identity-based (from now on, ID-based) Cryptography as an alternative to traditional Public Key cryptography, based on Infrastructures(PKI). In PKI-based cryptography, a certification authority must sign a digital certificate which links the identity of the user and his public key. Obviously, the management of digital certificates decreases the efficiency of practical implementations of public key cryptosystems. The idea of ID-based cryptography is that the public key of any user directly infers from his identity (e-mail address, telephone number, etc.).

  • Format: PDF
  • Size: 502.42 KB