Improved Identity-Based Identification Using Correcting Codes

Free registration required

Executive Summary

One of the most critical points of Public Key Cryptography (PKC) is that of the management of the authenticity of the public key. It is the very single point that anchors public key cryptography to the real world. If no such mechanism is provided the consequences are fatal. In fact, if Alice is able to take Bob's identity by faking her own public key as Bob's one, she would be able to decipher all messages sent to Bob or to sign any message on behalf of Bob. In 1984, Shamir introduced the concept of Identity-based Public Key Cryptography ID-PKC in order to simplify the management and the identification of the public key, which, time passing by, had become more and more complex.

  • Format: PDF
  • Size: 224.59 KB