UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

SUBMIT
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ETSI - TR 103 719

Guide to Identity-Based Cryptography

active, Most Current
Organization: ETSI
Publication Date: 1 March 2022
Status: active
Page Count: 58
scope:

The present document describes the use and application of Identity-Based Cryptography (IBC) applied to both encryption, as Identity-Based Encryption (IBE), and to digital signature, as Identity-Based Signature (IBS). The present document is intended to allow non-experts in the technology of IBC to be able to gain an understanding of the technology, its domains of application, and its required environment.

In addition the present document reviews use of IBE against more common asymmetric encryption schemes (e.g. RSA and ECC schemes), as well as more generalized Functional Encryption (FE) and Attributed Based Encryption (ABE) schemes. The present document also reviews use of IBS against more common digital signature schemes (e.g. DSA, ECDSA). An overview of algorithms and their modes of operation available to implement IBE, and IBS, and their evolution to quantum safe instances is also covered in the present document.

Document History

TR 103 719
March 1, 2022
Guide to Identity-Based Cryptography
The present document describes the use and application of Identity-Based Cryptography (IBC) applied to both encryption, as Identity-Based Encryption (IBE), and to digital signature, as Identity-Based...

References

Advertisement