HOME

TheInfoList



OR:

Secure key issuing is variant of
ID-based cryptography Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as a public key. The public string could include an email address, domain name, or a physical IP add ...
that reduces the level of trust that needs to be placed in a
trusted third party In cryptography, a trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of c ...
by spreading the trust across multiple third parties.{{cite journal, first1=Byoungcheon, last1=Lee, first2=Colin, last2=Boyd, first3=Kwangjo, last3=Kim, first4=Jeongmo, last4=Yang, title=Secure Key Issuing in ID-based Cryptography, url=https://www.researchgate.net/publication/2924148, date=20 May 2004, volume=32, first5=Seungjae, last5=Yoo In addition to the normally transmitted information the user supplies what is known as "blinding" information which can be used to blind (hide) data so that only the user can later retrieve it. The third party provides a "blinded" partial private key, which is then passed on to several other third party in order, each adding another part of the key before blinding it and passing it on. Once the user gets the key they (and only they) can unblind it and retrieve their full private key, after which point the system becomes the same as identity based cryptography. If all of the third parties cooperate they can recover the private key, so
key escrow Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third pa ...
problems arise only if all of the third parties are untrustworthy. In other areas of information security this is known as a
cascade Cascade, Cascades or Cascading may refer to: Science and technology Science *Cascade waterfalls, or series of waterfalls * Cascade, the CRISPR-associated complex for antiviral defense (a protein complex) * Cascade (grape), a type of fruit * Bioc ...
, if every member of the cascade is independent and the cascade is large then the system may be considered trustworthy in actual practice. The paper below states that "Compared with certificate-based cryptography, ID-based cryptography is advantageous in key management, since key distribution and key revocation are not required." However this poses a problem in long-lived environments where an identity (such as an email address) may shift in ownership over time and old keys need to be revoked and new keys associated with that identity provided to a new party.


References


External links


'Secure Key Issuing in ID-based Cryptography'
Key management