ID based PKC systems have another application which is very useful:
non-interactive forward secrecy. Ross Anderson has a nice write up of the
equivalence here:
http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf
particulary section 1.3. An ID based PKC system can be used to build
ID based public key is not a new concept, I believe first proposed by Adi
Shamir in Crypto 84 (the first I attended :-). It's a cute concept, but I'm
skeptic about its practical value - except of course as a way to force
parties to use private keys known to authorities :-(
The security requiremen
M Taylor wrote:
> The UK Communications-Electronics Security Group (CESG), the "defensive"
> arm of the GCHQ, have published details about another PKC concept,
> identity-based PKC, where every user's public key are predetermined by an
> unique identifier, such as email address. It does use a(/t
The UK Communications-Electronics Security Group (CESG), the "defensive"
arm of the GCHQ, have published details about another PKC concept,
identity-based PKC, where every user's public key are predetermined by an
unique identifier, such as email address. It does use a(/two) trusted
server(s), bu