Abstract:
Identity-based cryptography is proposed to simplify key management which is one of the most complex problems in certificate-based cryptography. Firstly, the identity-based cryptography technologies are surveyed from three fundamental primitives (encryption, digital signature, and key agreement), and some problems in these technologies are analyzed, including security models, efficiency, and so on. Because of the lack of study for applications, how to apply identity-based cryptography to implement access authentication and data confidentiality in wireless mobile IPv6 network is discussed. Finally, the possible new directions of identity-based cryptography techniques and the applications are pointed out.