|
Work Item Reference |
ETSI Doc. Number |
STF |
Technical Body in Charge |
Download Standard
|
|
DTR/CYBER-0045
|
TR 103 719
|
|
CYBER
|
|
Current Status (Click to View Full Schedule) |
Latest Version
|
Cover Date |
Standstill |
Creation Date |
|
Publication (2022-03-18)
|
1.1.1
|
2022-03-18
|
View Standstill Information
|
2019-01-05
|
|
Rapporteur |
Technical Officer |
Harmonised Standard |
|
|
Scott Cadzow
|
Sonia Compans
|
No
|
|
|
Title
|
Guide to Identity-Based Cryptography Guide to Identity Based Cryptography
|
Scope and Field of Application
|
A survey and explainer for Identity Based Encryption – technologies, use-cases, properties.The purpose of this report is to demystify IBE sufficiently that engineers can go and develop for it and adopt it for both encryption, and in digital signature applications. The report will describe the key management issues, the cryptography that underpins IBE, the threats and mitigations surrounding IBE, and also look at the wider worlds of conventional RSA and ECC based asymmetric crypto as well as ABE as a comparison. The report will in addition identify requirements for future IBE standardisation in ETSI CYBER.
|
Supporting Organizations
|
Cadzow Communications, CNRS, Nagravision S.A., Netscout Systems Inc., IBIT Ambrosini, NCSC
|