Write, autoreview, editor, reviewer
3,129
edits
Line 11: | Line 11: | ||
==Outline== | ==Outline== | ||
The entire protocol is broken in three phases: Key Generation, Signature and Verification. This scheme is presented between PKG, a Signer and a Verifier | The entire protocol is broken in three phases: Key Generation, Signature and Verification. This scheme is presented between PKG, a Signer and a Verifier.</br> | ||
* '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | * '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | ||
** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. | ** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. |