Question: We discussed public key cryptography, and certification by a trusted authority as a means of key distribution in public key cryptography. There is also an

We discussed public key cryptography, and certification by a trusted authority as a means of key distribution in public key cryptography. There is also an emerging paradigm called identity-based cryptography, which works as follows. Each user sets its public key as its identity ID (such as an email address); obtains a signature of a trusted authority on its public key and set this signature as its private key. The users can use the public key and private key pairs for secure communication with each other (everyone needs to know the public key of the trusted authority to do so, as in the public-key cryptography).

Compare the identity-based cryptography with the public-key cryptography (say which one is better and explain why), in terms of the following:

1. Security of the joining process (which is the process of obtaining a certificate in public key crypto, and a signature in identity-based crypto)

2. Cost of key generation on the user

3. Level of trust on the trusted authority

4. Usability of secure communication (both for confidentiality and authentication)

5. Revocation

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!