Authenticity of public keys in asymmetric cryptosystems

被引:0
|
作者
Lee, WB [1 ]
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Inst Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
public key infrastructure; discrete logarithm; X.509; asymmetric cryptosystems;
D O I
10.1016/S0140-3664(97)00176-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the public key infrastructure has become increasingly important for cryptographic schemes. Little research has been done, however, on the design of public key infrastructures. Although the public key infrastructure can be solved using the current standard X.509, it has not proved to be efficient when the required security level is high. In this paper, we introduce a two-level public key infrastructure. It provides a more practical and competitive application than X.509. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:195 / 198
页数:4
相关论文
共 50 条
  • [1] Similar keys of multivariate quadratic public key cryptosystems
    Hu, YH
    Wang, LC
    Chou, CY
    Lai, FP
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 211 - 222
  • [2] Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms
    戴瑞恩
    罗平
    彭小宁
    王道顺
    Tsinghua Science and Technology, 2005, (05) : 579 - 581
  • [3] On the Equivalent Keys in Multivariate Cryptosystems
    刘明洁
    韩立东
    王小云
    TsinghuaScienceandTechnology, 2011, 16 (03) : 225 - 232
  • [4] Parallel computation of the generating keys for RSA cryptosystems
    Chang, CC
    Hwang, MS
    ELECTRONICS LETTERS, 1996, 32 (15) : 1365 - 1366
  • [5] Fast generating method for keys of RSA cryptosystems
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 1999, 28 (05): : 461 - 463
  • [6] ASYMMETRIC CRYPTOSYSTEMS ON BOOLEAN FUNCTIONS
    Agibalov, G. P.
    Pankratova, I. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2018, (40): : 23 - 33
  • [7] A new paradigm for group cryptosystems using quick keys
    Saxena, A
    Soh, B
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 385 - 389
  • [8] PUBLIC KEY CRYPTOSYSTEMS
    ELKATEEB, A
    ALKHAYATT, S
    INFORMATION AGE, 1983, 5 (04): : 232 - 237
  • [9] A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation
    Brisola, Neander L.
    Santin, Altair O.
    Lung, Lau C.
    Ribeiro, Heverson B.
    Vithoft, Marcelo H.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 159 - +
  • [10] ALGEBRAIC METHODS FOR CONSTRUCTING ASYMMETRIC CRYPTOSYSTEMS
    IMAI, H
    MATSUMOTO, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 229 : 108 - 119