Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
|||
Line 11: | Line 11: | ||
==Outline== | ==Outline== | ||
Like other QDS protocols, it is divided into two phases: Distribution (Key Generation) and Messaging ( | Like other QDS protocols, it is divided into two phases: Distribution (Key Generation, Signature Distribution) and Messaging (signing/verification). This scheme is presented between seller (one who signs the message), buyer (one whom the signed message is sent) and PKG (generates and distributes public-private key for seller) and a buyer.</br> | ||
* '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | * '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | ||
** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. | ** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. |