SELF-CERTIFIED PUBLIC KEYS

被引:0
|
作者
GIRAULT, M
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce the notion, and give two examples, of self-certified public keys, i.e. public keys which need not be accompanied with a separate certificate to be authenticated by other users. The trick is that the public key is computed by both the authority and the user, so that the certificate is ''embedded'' in the public key itself, and therefore does not take the form of a separate value. Self-certified public keys contribute to reduce the amount of storage and computations in public key schemes, while secret keys are still chosen by the user himself and remain unknown to the authority. This makes the difference with identity-based schemes, in which there are no more certificates at all, but at the cost that secret keys are computed (and therefore known to) the authority.
引用
收藏
页码:490 / 497
页数:8
相关论文
共 50 条
  • [41] Secure self-certified COTS
    Debbabi, M
    Giasson, E
    Ktari, B
    Michaud, F
    Tawbi, N
    IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 183 - 188
  • [42] Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications
    Lara, Evangelina
    Aguilar, Leocundo
    Garcia, Jesus A.
    IEEE ACCESS, 2021, 9 : 79196 - 79213
  • [43] Improvement of threshold signature scheme using self-certified public key
    Li, Jiguo
    Zhang, Yichen
    Wang, Zhijian
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 480 - +
  • [44] On the security of a digital signature with message recovery using self-certified public key
    Zhang, JH
    Li, HA
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1171 - 1174
  • [45] Cryptographic systems using a self-certified public key based on discrete logarithms
    Shao, Z
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (06): : 233 - 237
  • [46] A Identification and Key Establishment Scheme based on Self-Certified Public Key for MANETs
    Zhang, Dongwei
    Sun, Yi
    Luo, Yuanyan
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [47] Design and Security Analysis of AKE Protocol Based on Self-certified Public Key
    Zhang Hongqi
    Cao Binghua
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 756 - 760
  • [48] On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key
    Zhang, Jianhong
    Zou, Wei
    Chen, Dan
    Wang, Yumin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2005, 29 (03): : 343 - 346
  • [49] An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
    Li, Shudong
    Wu, Xiaobo
    Zhao, Dawei
    Li, Aiping
    Tian, Zhihong
    Yang, Xiaodong
    PLOS ONE, 2018, 13 (10):
  • [50] A note on Girault's self-certified model
    Saeednia, S
    INFORMATION PROCESSING LETTERS, 2003, 86 (06) : 323 - 327