Search results
Results from the WOW.Com Content Network
Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This means that a sender who has access to the public parameters of the system can ...
The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. [1] This article refers to the protocol version called BasicIdent. It is an application of pairings (Weil pairing) over elliptic curves and finite fields.
Pairing-based cryptography is used in the KZG cryptographic commitment scheme. A contemporary example of using bilinear pairings is exemplified in the BLS digital signature scheme. [3] Pairing-based cryptography relies on hardness assumptions separate from e.g. the elliptic-curve cryptography, which is older and has been studied for a longer time.
The Weil pairing is an important concept in elliptic curve cryptography; e.g., it may be used to attack certain elliptic curves (see MOV attack). It and other pairings have been used to develop identity-based encryption schemes.
In mathematics, the Weil pairing is a pairing (bilinear form, though with multiplicative notation) on the points of order dividing n of an elliptic curve E, taking values in nth roots of unity. More generally there is a similar Weil pairing between points of order n of an abelian variety and its dual.
It has several applications on cryptography, as key exchange protocols, identity-based encryption, and broadcast encryption. There exist constructions of cryptographic 2-multilinear maps, known as bilinear maps, [ 1 ] however, the problem of constructing such multilinear [ 1 ] maps for n > 2 {\displaystyle n>2} seems much more difficult [ 2 ...
This is because the Weil pairing or Tate pairing can be used to solve the problem directly as follows: given ,,, on such a curve, one can compute (,) and (,). By the bilinearity of the pairings, the two expressions are equal if and only if a b = c {\displaystyle ab=c} modulo the order of P {\displaystyle P} .
As a specific method for identity-based encryption, the primary use case is to allow anyone to encrypt a message to a user when the sender only knows the public identity (e.g. email address) of the user. In this way, this scheme removes the requirement for users to share public certificates for the purpose of encryption.