Cryptology ePrint Archive: Report 2011/266
Daniel R. L. Brown
Abstract: Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authorityís public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bobís identity.
Category / Keywords: public-key cryptography / identity-based
Date: received 25 May 2011, last revised 30 May 2011
Contact author: dbrown at certicom com
Available formats: PDF | BibTeX Citation
Note: Informed of previous similar work.
Version: 20110530:181337 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]