Identity-based cryptography can be useful in situations where a full-scale public-key infrastructure is impractical. Original identity-based proposals relied on elliptic curve pairings and so are vulnerable to quantum computers. I will describe some on-going work to design a post-quantum identity-based encryption scheme using ideas from Ring Learning with Errors. Our scheme has the advantage that it can be extended to the hierarchical setting for more flexible key management.
- Cryptography Seminar