Identity Based Cryptography results in an Identity Based signature Scheme resulting in secure and properly authenticated systems. In Identity based cryptography scheme, data is encrypted using an arbitrary string as the key. For decryption, decryption key is mapped to the arbitrary encrypted key by a key authority. Identity based cryptography is a type of public-key cryptography in which the public key of a user is some unique information about the identity of the user. ID-Based Cryptography allows for a user’s identity information such as his telephone number, email address, and ID card number to serve as his/her public key.

Advantages of Identity-based Cryptography

  • The main advantage of ID-based cryptography is to reduce largely the amount of computation and memory requirements for certificate management.
  • In ID based cryptography, key distribution and key revocation are not required.
  • The entity public key is directly derived from its identity information in ID based cryptography.
  • The corresponding private key is generated for the user by a trusted third party called key generation center and given to the user through a secure channel.
  • ID based encryption scheme can be designed easily.

Limitations of Identity-based Cryptography

  • ID-based cryptography is considered to be suitable only for small private network with lower security requirements.
  • In this ID based cryptography technique, there exists a problem called key escrow problem.
  • The key escrow problem in ID-based cryptography limits its application scope.