SELF-CERTIFIED PUBLIC KEYS

被引:0
|
作者
GIRAULT, M
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce the notion, and give two examples, of self-certified public keys, i.e. public keys which need not be accompanied with a separate certificate to be authenticated by other users. The trick is that the public key is computed by both the authority and the user, so that the certificate is ''embedded'' in the public key itself, and therefore does not take the form of a separate value. Self-certified public keys contribute to reduce the amount of storage and computations in public key schemes, while secret keys are still chosen by the user himself and remain unknown to the authority. This makes the difference with identity-based schemes, in which there are no more certificates at all, but at the cost that secret keys are computed (and therefore known to) the authority.
引用
收藏
页码:490 / 497
页数:8
相关论文
共 50 条
  • [1] On the Security of Self-Certified Public Keys
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (02) : 54 - 60
  • [2] Threshold signature scheme using self-certified public keys
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 89 - 97
  • [3] Proxy signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1380 - 1389
  • [4] Self-certified keys - Concepts and applications
    Petersen, H
    Horster, P
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 102 - 116
  • [6] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [7] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [8] A threshold proxy signature scheme using self-certified public keys
    Xue, QS
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 715 - 724
  • [9] Cryptanalysis of group signature scheme using self-certified public keys
    Sun, HM
    Chen, BJ
    Hwang, T
    ELECTRONICS LETTERS, 1999, 35 (22) : 1938 - 1939
  • [10] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122