Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 512

Identity-Based Encryption

What is Identity-Based Encryption?

Identity-Based EncryptionPublic-key encryption where an arbitrary identifier (email, phone) serves as the public key, with private keys issued by a trusted Private Key Generator (Boneh/Franklin 2001).


Identity-Based Encryption (IBE) lets the sender encrypt directly to a recipient's identity string - for example alice@example.com - without first fetching a certificate. A trusted authority called the Private Key Generator (PKG) holds a master secret, publishes master public parameters, and on demand derives the recipient's private key from their identity. The first practical IBE was Boneh-Franklin (2001), based on bilinear pairings; the Sakai-Kasahara and Cocks IBE schemes followed. IBE eliminates X.509 certificate management at the cost of inherent key escrow, since the PKG can decrypt all messages. It is standardised in IETF RFC 5091 and used in MIKEY-SAKKE for UK/EU secure voice, S/MIME alternatives, IoT key bootstrapping, and as a stepping stone toward attribute-based and functional encryption.

Examples

  1. 01

    MIKEY-SAKKE used by UK Government's secure voice systems is built on IBE.

  2. 02

    Voltage SecureMail uses Boneh-Franklin IBE to send to bare email addresses.

Frequently asked questions

What is Identity-Based Encryption?

Public-key encryption where an arbitrary identifier (email, phone) serves as the public key, with private keys issued by a trusted Private Key Generator (Boneh/Franklin 2001). It belongs to the Cryptography category of cybersecurity.

What does Identity-Based Encryption mean?

Public-key encryption where an arbitrary identifier (email, phone) serves as the public key, with private keys issued by a trusted Private Key Generator (Boneh/Franklin 2001).

How does Identity-Based Encryption work?

Identity-Based Encryption (IBE) lets the sender encrypt directly to a recipient's identity string - for example alice@example.com - without first fetching a certificate. A trusted authority called the Private Key Generator (PKG) holds a master secret, publishes master public parameters, and on demand derives the recipient's private key from their identity. The first practical IBE was Boneh-Franklin (2001), based on bilinear pairings; the Sakai-Kasahara and Cocks IBE schemes followed. IBE eliminates X.509 certificate management at the cost of inherent key escrow, since the PKG can decrypt all messages. It is standardised in IETF RFC 5091 and used in MIKEY-SAKKE for UK/EU secure voice, S/MIME alternatives, IoT key bootstrapping, and as a stepping stone toward attribute-based and functional encryption.

How do you defend against Identity-Based Encryption?

Defences for Identity-Based Encryption typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Identity-Based Encryption?

Common alternative names include: IBE, Boneh-Franklin IBE, Identity-based cryptography.

Related terms