DocumentCode
769131
Title
Fitting Square Pegs into Round Holes
Author
Martin, Luther
Author_Institution
Voltage Security, Palo Alto, CA
Volume
4
Issue
5
fYear
2006
Firstpage
64
Lastpage
66
Abstract
By nature, cryptographers tend to be extremely cautious and conservative. From their perspective, spending time getting people to use a new cryptographic algorithm is roughly on par with getting involved in a land war in Asia. In some cases, however, the difficulty involved in developing a new algorithm is worth the effort. This is the case with identity-based encryption (IBE), a new type of public-key algorithm
Keywords
public key cryptography; cryptographic algorithm; identity-based encryption; public-key algorithm; Asia; Computer security; Elliptic curve cryptography; Identity-based encryption; Information retrieval; Information security; Privacy; Public key; Public key cryptography; Uniform resource locators; IBE; identity-based encryption; secure email;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2006.120
Filename
1704786
Link To Document