This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Securing E-Mail with Identity-Based Encryption
May/June 2005 (vol. 7 no. 3)
pp. 64, 61-63
Noel McCullagh, Dublin City University
Today, few people encrypt e-mail because it is just too difficult for the average user. A public-key infrastructure (PKI) requires users to locate a certificate authority that can issue a digital certificate to authenticate a public key, publicize the public key to others, renew the certificate when it expires, and so on. Identity-based encryption (IBE), on the other hand, can use any publicly available information to create a public key; such information could be e-mail addresses, Internet Protocol addresses, phone numbers, and dates (to allow for validity periods). IBE relies on a centralized key generation center (KGC), which is responsible for the creation and secure distribution of private keys to users. These characteristics make it easier for large organizations to require e-mail encryption.
Index Terms:
identity-based encryption, IBE, key generation center, KGC, e-mail, security.
Citation:
Noel McCullagh, "Securing E-Mail with Identity-Based Encryption," IT Professional, vol. 7, no. 3, pp. 64, 61-63, May-June 2005, doi:10.1109/MITP.2005.70
Usage of this product signifies your acceptance of the Terms of Use.