Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Trusted Authority

Encyclopedia of Information Science and Technology, Fourth Edition
The Trusted Authority is a third party trusted to distribute keys. In the Identity Based Encryption Schemes, the Trusted Authority provide secret keys.
Published in Chapter:
Security of Identity-Based Encryption Algorithms
Kannan Balasubramanian (Mepco Schlenk Engineering College, India) and M. Rajakani (Mepco Schlenk Engineering College, India)
Copyright: © 2018 |Pages: 10
DOI: 10.4018/978-1-5225-2255-3.ch431
Abstract
The concept of Identity Based Cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP Addresses to form public keys with the corresponding private keys being created by the Trusted Authority(TA) who is in possession of a system-wide master secret. Then a party, Alice who wants to send encrypted communication to Bob need only Bob's identifier and the system-wide public parameters. Thus the receiver is able to choose and manipulate the public key of the intended recipient which has a number of advantages. While IBC removes the problem of trust in the public key, it introduces trust in the TA. As the TA uses the system-wide master secret to compute private keys for users in the system, it can effectively recompute a private key for any arbitrary string without having to archive private keys. This greatly simplifies key management as the TA simply needs to protect its master secret.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Dynamic Reputation-Based Incentive Scheme to Encourage Selfish Nodes in Post-Disaster Situation Using Delay-Tolerant Network
The authorized node, which is responsible to monitor other nodes’ behavior or cooperation pattern, is termed as Trusted Authority node.
Full Text Chapter Download: US $37.50 Add to Cart
Identification Protocols
Validates an identity of a user that aims to send messages, or generates a new identity and certifies a user has a denoted identity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR