Shamir, Adi Identity-based cryptosystems and signature schemes. (English) Zbl 1359.94626 Blakley, G.R. (ed.) et al., Advances in cryptology. Proceedings of CRYPTO ’84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19–22, 1984). Berlin: Springer. Lecture Notes in Computer Science 196, 47-53 (1985). Summary: We introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. The scheme assumes the existence of trusted key generation centers, whose sole purpose is to give each user a personalized smart card when he first joins the network. The information embedded in this card enables the user to sign and encrypt the messages he sends and to decrypt and verify the messages he receives in a totally independent way, regardless of the identity of the other party. Previously issued cards do not have to be updated when new users join the network, and the various centers do not have to coordinate their activities or even to keep a user list. The centers can be closed after all the cards are issued, and the network can continue to function in a completely decentralized way for an indefinite period.For the entire collection see [Zbl 0566.00035]. Cited in 19 ReviewsCited in 554 Documents MSC: 94A60 Cryptography × Cite Format Result Cite Review PDF Full Text: DOI