Identity-Based Cryptographic Techniques using Pairings
|Publication Date:||22 August 2013|
This document specifies identity-based cryptographic schemes based on the bilinear mappings over elliptic curves known as pairings. Specific techniques include algorithms to compute the pairings and specification of recommended elliptic curves and curve parameters over which the pairings are defined. The class of computer and communications systems is not restricted.
Purpose The proliferation of electronic communication and the Internet brings with it the need for privacy and data protection. Public-key cryptography offers fundamental technology addressing this need. Many alternative public-key techniques have been proposed, each with its own benefits. IEEE Std 1363TM-20001 and IEEE Std 1363aTM-2004 have produced a comprehensive reference defining a range of common public-key techniques covering key agreement, public-key encryption, and digital signatures from several families, namely the discrete logarithm, integer factorization, and elliptic curve families. This document will specify identity-based cryptographic techniques based on pairings. These offer advantages over classic public-key techniques specified in IEEE Std 1363-2000. Examples are the lack of a requirement to exchange or look up public keys of a recipient and the simplified use of short-lived keys. The class of computer and communications systems is not restricted.
1 Information on references can be found in Clause 2.