Identity-based encryption and signature method In a public-key infrastructure without certificates The purpose of the invention is to remedy the problems related to the management of certificates. Thus in the system that is proposed, all the public keys can be recalculated from a public data. It is no longer necessary to memorize the list of public keys of each partner. The invention consists of (1) an asymmetric identity-based encryption method that requires the use of a symmetric or asymmetric bilinear function, (2) an identity-based signature method that requires the use of a symmetric or asymmetric bilinear function, (3) a key management infrastructure based on a PKGdy dynamic (on-line) central authority and a static central authority as well as (4) a management infrastructure of keys compatible with authenticated encryption such as that proposed in [4]. The invention is likely to be applied wherever it is usual to use a PKI to protect information (banks, insurance, army, innovative SMEs ...). Add that a simple modification of the TLS information transport protocol makes it possible to make this method compatible with most existing VPNs, the Internet (https), the web services ... It should also be noted that most of the SIEMs (analysis system log and event) protect the transport of logs with the TLS protocol, which makes them compatible with the process outlined in this document.
展开▼