A note on Girault's self-certified model

被引:26
|
作者
Saeednia, S [1 ]
机构
[1] Free Univ Brussels, Dept Informat, B-1050 Brussels, Belgium
关键词
self-certified; levels of trust; random safe primes; zero-knowledge; discrete logarithm; cryptography;
D O I
10.1016/S0020-0190(03)00203-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we describe an important shortcoming of the first self-certified model proposed by Girault, that may be exploited by the authority to compute users' secret keys. We also show, while it is possible to make the attack ineffective by taking additional precautions, the resulting model loses all merits of the original model and does no longer meet the primary contribution of the self-certified notion. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:323 / 327
页数:5
相关论文
共 50 条
  • [31] Self-certified Public Auditing for Data Integrity in Cloud Storage
    Zhang, Jianhong
    Zeng, Weina
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 267 - 273
  • [32] Proxy signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1380 - 1389
  • [33] Improvement of threshold signature scheme using self-certified public key
    Li, Jiguo
    Zhang, Yichen
    Wang, Zhijian
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 480 - +
  • [35] Remark on self-certified group-oriented cryptosystem without combiner
    Susilo, W
    Safavi-Naini, R
    ELECTRONICS LETTERS, 1999, 35 (18) : 1539 - 1540
  • [36] Distributed Private-Key Generation Scheme with Self-Certified Identity
    Xie, Yongming
    Wang, Guojun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 501 - 508
  • [37] Modification to self-certified group-oriented cryptosystem without combiner
    Ghodosi, H
    Saeednia, S
    ELECTRONICS LETTERS, 2001, 37 (02) : 86 - 87
  • [38] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [39] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [40] Identity-based and self-certified key-exchange protocols
    Saeednia, S
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 303 - 313