Identity-based cryptograph (IBC) is an identity-based cryptographic technology developed based on the Traditional PKI (Public Key Infrastructure, it mainly reduces the complexity of deploying and using specific security applications and avoids the exchange of a large number of digital certificates generated by security applications.
Both IBC and RSA are asymmetric encryption algorithms. The differences between IBC and RSA are as follows:
1. Public Key source
The RSA public key is a string of numbers generated by random calculation. It must pass the certificate before it can be associated with the user's identity,
Certificate Management requires a complex infrastructure (Public Key Infrastructure: PKI)
The IBC public key can be any character data, which can be easily directly associated with the user's identity or role without passing through certificate exchange and building related expensive infrastructure.
2. Example
RSA public key
30 81 89 02 81 81 00 C6 61 22 C4 09 8A F5 9B Fe C3 16 99
1e 48 FD 69 dd C9 C6 EF 4D E9 fa 49 41 D9 8C 50 DF dd 26
3A 45 ce 57 5C 2C 35 B0 12 77 6B EA 1D A1 cb21 B9 69
D8 74 EE C2 F7 48 F3 2f 45 5f EA 68 B0 C4 E2 7d 95 D0 DC
D5 00 F3 36 de 45 A0 D1 9e 4A 44 47 01 D1 13 C3 59 4C 09
A4 4C 7E 9B 50 31 5f 28 56 6D BD 4B 8d 5f 57 65 C8 be 86
17 3C 58 96 90 B8 1f F3 29 B0 dd 5A 00 CF 15 A9 84 33 24
60 87 02 03 01 00 01
IBC Public Key
Jiadelin@htjs.net or your arbitrary string.
3 IBC Technology Innovation
- NoCertificates verification and other computing processes in PKI have a low computing cost and are suitable for mobile terminals.
- NoOnline connection to the CA Server of PKI to query and verify the certificate status, with a low communication cost
Rich policy control mechanisms that combine identity authentication and access control into one
Procedure:
N