# IEEE P1363

The IEEE Standard Specifications for Public-Key Cryptography [1] have been developed as part of the IEEE P1363 standardization project. This project also includes standards for lattice-based cryptography [2], password-based cryptography [3], and identity-based cryptography using pairings [4]. The IEEE P1363 working group started working on the standards in 1994, and in 2000 the standard 1363-2000 was published. In 2004 an amendment was published which contains specifications of ECIES and the Pintsov-Vanstone signature scheme providing message recovery and allowing extension fields of odd characteristics, including optimal extension fields [5]. In 2019, all 1363 standards were made inactive except for 1363.3-2013.

The standard 1363-2000 provides a comprehensive reference defining a full range of common public-key techniques and doesn't mandate any specific set of parameters or techniques for the public-key algorithms as opposed to other standards. A method of generation of elliptic curves is recommended, but it is the same method as in ANSI X9.62 (1998 version) except for one difference regarding the bound on the embedding degree: it specifies that if m is the bit-length of the prime subgroup order and $T:R \to R$ is a function defined by $T(n) = \frac{8}{3}(3n(log_2(n\ln2)^2)^{1/3}-17.135872$ then the bound $B$ on the embedding degree should be large enough so that $T(mB)\geq m$.

The IEEE standards can be divided into four statuses: active, superseded, inactive-reserved, and inactive-withdrawn [6]. If an active standard hasn't undergone a revision process within ten years (from initial approval or from the last maintenance action), then it must be moved to the status inactive-reserved. To be inactive-withdrawn a consensus decision of a balloting group [7]. Since the P1363 group hasn't met for a long period of time exceeding ten years, the standards have been moved to the status inactive-reserved [8].

- IEEE Standard Specifications for Public-Key Cryptography
- IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices
- IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques
- IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
- IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques
- Maintenance of IEEE Standards FAQs on the official IEEE website
- Revising standards on the official IEEE website
- Security StackExchange