Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
Today, few people encrypt e-mail because it is just too difficult for the average user. A public-key infrastructure (PKI) requires users to locate a certificate authority that can issue a digital certificate to authenticate a public key, publicize the public key to others, renew the certificate when it expires, and so on. Identity-based encryption (IBE), on the other hand, can use any publicly available information to create a public key; such information could be e-mail addresses, Internet Protocol addresses, phone numbers, and dates (to allow for validity periods). IBE relies on a centralized key generation center (KGC), which is responsible for the creation and secure distribution of private keys to users. These characteristics make it easier for large organizations to require e-mail encryption.