Trusted Generation of Public Keys — Based on Your Identity

In 1984, Adi Shamir proposed an alterative to PKI (Public Key Infrastructure) [here][1]:

Identity-based Encryption (IBE) involves generating the encryption key from a piece of identity for the…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

Top 5 Powerful Benefits of Cloud Backup for Enterprise

Which Crypto Hashing Method is a Gas … And is as Slow as You Want and breaks GPUs?

How Can I Get You To Do a Difficult Piece of Maths …

The Secret_Tipbot is now live.

Tales Of Angels Weekly Update #6

Euler: The Father of Mathematics and Layer of Internet Security

Commonwealth x Marlin Form Brand New Partnership

Digital Securty Low Hanging Fruit

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.