Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Identity-Based Encryption

1 min read
Pronunciation
[ahy-den-ti-tee beyst en-krip-shuhn]
Analogy
Imagine you want to send a secret message to 'ceo@example.com'. With traditional public-key crypto, you first need to find a certificate that proves which public key belongs to 'ceo@example.com'. With IBE, 'ceo@example.com' *is* the public key. You encrypt your message directly for this identifier. The CEO gets a special private key from a trusted authority that corresponds to their email address, allowing them to decrypt.
Definition
A type of public-key encryption that allows a public key to be an arbitrary string, such as an email address or a domain name, rather than a random-looking string. This simplifies key management as users don't need to obtain a digital certificate to bind their public key to their identity.
Key Points Intro
IBE simplifies key management by using human-readable identifiers as public keys.
Key Points

Public keys can be arbitrary strings like email addresses or phone numbers.

A trusted third party, called a Private Key Generator (PKG), generates private keys corresponding to these public identities.

Senders can encrypt messages for an identity without needing to first fetch that identity's public key certificate.

Recipients must obtain their private key from the PKG.

Example
A company could set up an IBE system where employees can encrypt emails to each other using their company email addresses as public keys. New employees automatically have a public key (their email address) and can receive encrypted mail once the PKG issues them their corresponding private key.
Technical Deep Dive
IBE was first proposed by Adi Shamir in 1984, but practical constructions were only developed later, often using pairing-based cryptography (e.g., Boneh-Franklin IBE). The PKG holds a master secret key. To generate a private key for an identity string ID, the PKG uses its master secret key and ID. The security relies on the assumption that the PKG is trusted and keeps the master secret key secure. IBE schemes eliminate the need for a Public Key Infrastructure (PKI) to distribute public key certificates, but introduce the PKG as a central point of trust and potential vulnerability (key escrow problem).
Security Warning
The main challenge with IBE is the inherent key escrow: the PKG knows all private keys, so it must be highly trusted and secured. If the PKG's master secret key is compromised, all private keys in the system are compromised. Some variants like certificateless or certificate-based encryption try to mitigate this.

Identity-Based Encryption - Related Articles

No related articles for this term.