In 1984, Shamir managed to build an Identity-Based Encryption (IBE) scheme in which an entity's public identification information, such as an email address or a telephone number, can be used as a valid public key. For instance, in an IBE email system, when Alice wishes to send an email to Bob at bob@company.com, she simply encrypts the email using the public key string "bob@company.com", without the need for Bob's public key certificate. Once Bob receives the encrypted email, he authenticates himself to a trusted third party, which we call the Private Key Generator (PKG), to request his private key corresponding to the public identity bob@company.com. After receiving the private key, Bob can read the email. It was not until 2001 that the fi...