Identity-Based Cryptography

  • José Luis Gómez PardoEmail author


This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities. The basic idea of IBC starts from the realization that there is some minimal information that a user has to learn before communicating with another party, even in unencrypted form, namely, some identity information such as, for example, an email address. In IBC, this basic informacion replaces the need for a public key or, in slightly different terms, the public key of a user is her identity string or some string easily derivable from this identity by a specified method.


Encryption Scheme Random Oracle Random Oracle Model Cryptographic Hash Function Identity String 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Departamento de AlxebraUniversidade de SantiagoSantiago de CompostelaSpain

Personalised recommendations