Securing E-Mail with Identity-Based Encryption

  • Authors:
  • Noel McCullagh

  • Affiliations:
  • Dublin City University

  • Venue:
  • IT Professional
  • Year:
  • 2005
  • Copy protection for email

    Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today, few people encrypt e-mail because it is just too difficult for the average user. A public-key infrastructure (PKI) requires users to locate a certificate authority that can issue a digital certificate to authenticate a public key, publicize the public key to others, renew the certificate when it expires, and so on. Identity-based encryption (IBE), on the other hand, can use any publicly available information to create a public key; such information could be e-mail addresses, Internet Protocol addresses, phone numbers, and dates (to allow for validity periods). IBE relies on a centralized key generation center (KGC), which is responsible for the creation and secure distribution of private keys to users. These characteristics make it easier for large organizations to require e-mail encryption.