Privacy Management of Personal Data using Identifier Based Encryption (IBE)

2004 
When sending personal data to a recipient (30), the data owner (20) encrypts the data using both a public data item provided by a trusted party (40) and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient (30) along with the encrypted personal data. To decrypt the personal data, the recipient (30) sends the encryption key string to the trusted party (40) with a request for the decryption key. The trusted party (40) determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient (30). However, the decryption key is either not determined or not made available until the trusted party (40) is satisfied that the associated policy conditions have been met by the recipient.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    5
    References
    0
    Citations
    NaN
    KQI
    []