Abstract :
By nature, cryptographers tend to be extremely cautious and conservative. From their perspective, spending time getting people to use a new cryptographic algorithm is roughly on par with getting involved in a land war in Asia. In some cases, however, the difficulty involved in developing a new algorithm is worth the effort. This is the case with identity-based encryption (IBE), a new type of public-key algorithm
Keywords :
public key cryptography; cryptographic algorithm; identity-based encryption; public-key algorithm; Asia; Computer security; Elliptic curve cryptography; Identity-based encryption; Information retrieval; Information security; Privacy; Public key; Public key cryptography; Uniform resource locators; IBE; identity-based encryption; secure email;