A Photo Certificate-A Framework for Generating Visualized Public Key Certificates

被引:0
|
作者
Wei-Bin Lee [1 ]
Chien-Chen Huang [1 ]
Chia-Chen Lin [2 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University
[2] Department of Computer Science and Information Management, Providence University
关键词
Authentication; certificate; public key infrastructure; two-layer verifications; watermarking; X.509;
D O I
暂无
中图分类号
TN918.2 [密码、密码机];
学科分类号
0839 ; 1402 ;
摘要
In the proposed photo certificate, the principal component is the image, for example, the user’s photo. User-related fields, such as the subject’s name, the issuer’s name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is cryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the certificate’s verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user’s photo and its subject’s name are consistent and check whether the expired period is valid first. The second layer’s verification is lunched only when the first layer’s verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.
引用
收藏
页码:339 / 344
页数:6
相关论文
共 50 条
  • [1] Research on public key certificates
    Cheng, Changliang
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 587 - 588
  • [2] Classifying public key certificates
    Lopez, J
    Oppliger, R
    Pernul, G
    [J]. PUBLIC KEY INFRASTRUCTURE, 2005, 3545 : 135 - 143
  • [3] Generating Correlated Digital Certificates: Framework and Applications
    Zhu, Wen-Tao
    Lin, Jingqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1117 - 1127
  • [4] Anonymous public key certificates and their applications
    Oishi, K
    Mambo, M
    Okamoto, E
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1998, E81A (01): : 56 - 64
  • [5] Non-Invertible Public Key Certificates
    Adrian Lizama-Perez, Luis
    Mauricio Lopez, J. R.
    [J]. ENTROPY, 2021, 23 (02) : 1 - 13
  • [6] Dynamic Public Key Certificates with Forward Secrecy
    Chien, Hung-Yu
    [J]. ELECTRONICS, 2021, 10 (16)
  • [7] Virtual certificates and synthetic certificates: new paradigms for improving public key validation
    Russell, S
    Dawson, E
    Okamoto, E
    Lopez, J
    [J]. COMPUTER COMMUNICATIONS, 2003, 26 (16) : 1826 - 1838
  • [8] Applications in health care using public-key certificates and attribute certificates
    Wohlmacher, P
    Pharow, P
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 128 - 137
  • [9] Towards a better applicability of public-key certificates
    Hamdy, Safuat
    [J]. 2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 119 - 123
  • [10] Public Key Infrastructures and Digital Certificates for the Internet of Things
    Schukat, Michael
    Cortijo, Pablo
    [J]. 2015 26TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2015,