Identity-Based Encryption from the Weil Pairing
Boneh, Dan, and Matt Franklin
Annual International Cryptology Conference (2001), Berlin, Heidelberg: Springer Berlin Heidelberg: pp. 213-229
https://doi.org/10.1007/3-540-44647-8_13
“In 1984 Shamir asked for a public key encryption scheme in which the public key can be an arbitrary string. In such a scheme there are four algorithms: (1) setup generates global system parameters and a master-key, (2) extract uses the master-key to generate the private key corresponding to an arbitrary public key string ID ∈ {0, 1}*, (3) encrypt encrypts messages using the public key ID, and (4) decrypt decrypts messages using the corresponding private key.
Shamir’s original motivation for identity-based encryption was to simplify certificate management in e-mail systems. When Alice sends mail to Bob at bob@company.com she simply encrypts her message using the public key string “bob@company.com”. There is no need for Alice to obtain Bob’s public key certificate. When Bob receives the encrypted mail he contacts a third party, which we call the Private Key Generator (PKG). Bob authenticates himself to the PKG in the same way he would authenticate himself to a CA and obtains his private key from the PKG. Bob can then read his e-mail. Note that unlike the existing secure e-mail infrastructure, Alice can send encrypted mail to Bob even if Bob has not yet setup his public key certificate. ”
Bellare, Mihir, and Phillip Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications Security (1993): 62-73
Boneh, Dan, and James Shaw
IEEE Transactions on Information Theory 44, no. 5 (1998): 1897-1905
Richards, Blake A., Timothy Lillicrap, et al.
Nature Neuroscience 22, no. 11 (2019): 1761-1770.
Wickham, Hadley
Journal of statistical software 59 (2014): 1-23.
LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton
Nature 521, no. 7553 (2015): 436-444.
Bennett, Charles H., Gilles Brassard, and N. David Mermin
Physical Review Letters 68, no. 5 (1992): 557
Minsky, Marvin
Communications of the ACM 43, no. 8 (2000): 66-73
Turing, Alan
Proceedings of the London mathematical society 2, no. 1 (1937): 230-265
Lloyd, Seth
Nature 406, no. 6799 (2000): 1047-1054
Knuth, Donald E.
The Computer Journal 27, no. 2 (1984): 97-111
Brooks, Frederick P.
IEEE Computer 20, no. 4 (1987): 10-19
Lamport, Leslie, Robert Shostak, and Marshall Pease
ACM Transactions on Programming Languages and Systems (TOPLAS) 4, no. 3 (1982): 382–401
Lindley, Sam, Philip Wadler, and Jeremy Yallop
Journal of Functional Programming 20, no. 1 (2010): 51-69
Wadler, Philip
ACM SIGPLAN Notices 47, no. 9 (2012): 273-286
Boneh, Dan, and Matt Franklin
Annual International Cryptology Conference (2001), Berlin, Heidelberg: Springer Berlin Heidelberg: pp. 213-229