Identity-based Encryption Architecture
This document describes the security architecture required to implement
identity-based encryption, a public-key encryption technology that uses
a user?s identity as a public key.
Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems
This document describes the algorithms that implement Boneh-Franklin
and Boneh-Boyen Identity-based Encryption. This document is in part
based on IBCS #1 v2 of Voltage Security?s Identity-based Cryptography
Standards (IBCS) documents.
Identity-based Encryption Parameter and Policy Lookup
This document describes a protocol to obtain public parameters and
policy information for an identity-based encryption system.
Identity-based Encryption Private Key Request Protocol
This document describes a protocol to request private keys from a
Private Key Generator (PKG) for an identity-based encryption system.