This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (June 2020) (Learn how and when to remove this template message) This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "IEEE P1363" – news · newspapers · books · scholar · JSTOR (July 2020) (Learn how and when to remove this template message) (Learn how and when to remove this template message)

IEEE P1363 is an Institute of Electrical and Electronics Engineers (IEEE) standardization project for public-key cryptography. It includes specifications for:

The chair of the working group as of October 2008 is William Whyte of NTRU Cryptosystems, Inc., who has served since August 2001. Former chairs were Ari Singer, also of NTRU (1999–2001), and Burt Kaliski of RSA Security (1994–1999).

The IEEE Standard Association withdrew all of the 1363 standards except 1363.3-2013 on 7 November 2019.[1]

Traditional public-key cryptography (IEEE Std 1363-2000 and 1363a-2004)

This specification includes key agreement, signature, and encryption schemes using several mathematical approaches: integer factorization, discrete logarithm, and elliptic curve discrete logarithm.

Key agreement schemes

Signature schemes

Encryption schemes

Lattice-based public key cryptography (IEEE Std 1363.1-2008)

Password-based public-key cryptography (IEEE Std 1363.2-2008)

This document includes a number of password-authenticated key agreement schemes, and a password-authenticated key retrieval scheme.

Identity-based public key cryptography based on pairings (IEEE Std 1363.3-2013)

This standard was published on 15 November 2013. It includes techniques for identity-based encryption, signatures, signcryption, key agreement, and proxy re-encryption, all based on bilinear pairings.

References

  1. ^ "IEEE Standards: 1363-2000, 1363a-2004, 1363.1-2008, 1363.2-2008, 1363.3-2013".