This is my personal blog. The views expressed on these pages are mine alone and not those of my employer.

Saturday, September 13, 2003

I've been reading up on Identity Based Encryption (IBE) lately. Basicly, this is a subset of cryptography that is trying to get around the problems with standard public-key infrastructures (PKI). In Identity Based Encryption, any string can be used to generate a public key, such as using an email address or a username. The great thing about this is that now any person can figure out what my public key is from some well-known string, such as "BradGNUberg", without having to consult a public-key infrastructure. I'm interested in this because I am a P2P hacker, and I've been trying to figure out ways to do an end-run around Zooko's Triangle, which basicly states that you can't have a naming system that is decentralized, secure, and human-friendly all at the same time. I've currently built a light-weight domain name system in the JXTA P2P Sockets project, but it is not secure.

Some IBE resources I've found:

Some other interesting papers I found while trolling for IBE stuff:
Secure Communication in a Distributed System Using Identity Based Encryption
USING IDENTITY-BASED ENCRYPTION TO ELIMINATE CERTIFICATES IN SSL TRANSACTIONS

Comments: Post a Comment



Links to this post:

Create a Link



<< Home

This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]