Self-escrowed public-key infrastructures

被引:0
|
作者
Paillier, P [1 ]
Yung, M [1 ]
机构
[1] CertCo, New York, NY USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a cryptographic paradigm called self-escrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosystem features the property that the scheme's public and private keys are connected to each other by the mean of an other cryptosystem, called the master scheme. We apply this notion to the design of auto-recoverable auto-certifiable cryptosystems, a solution to software key escrow due to Young and Yung, and provide a new cryptographic escrow system called self-escrowed public key infrastructure. In addition, we give an example of such a system based on ElGamal and Paillier encryption schemes which achieves a high level of both efficiency and security.
引用
收藏
页码:257 / 268
页数:12
相关论文
共 50 条
  • [31] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    [J]. INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [32] ON THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    VANTILBURG, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 119 - 131
  • [33] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [34] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [35] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    [J]. CHAOS, 2004, 14 (04) : 1078 - 1082
  • [36] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    [J]. SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [37] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [38] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    [J]. DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [39] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    [J]. IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [40] The Cubic Public-Key Transformation
    Subhash Kak
    [J]. Circuits, Systems & Signal Processing, 2007, 26 : 353 - 359