Authenticity of public keys in asymmetric cryptosystems

被引:0
|
作者
Lee, WB [1 ]
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Inst Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
public key infrastructure; discrete logarithm; X.509; asymmetric cryptosystems;
D O I
10.1016/S0140-3664(97)00176-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the public key infrastructure has become increasingly important for cryptographic schemes. Little research has been done, however, on the design of public key infrastructures. Although the public key infrastructure can be solved using the current standard X.509, it has not proved to be efficient when the required security level is high. In this paper, we introduce a two-level public key infrastructure. It provides a more practical and competitive application than X.509. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:195 / 198
页数:4
相关论文
共 50 条
  • [31] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827
  • [32] On the Use of Gaussian Integers in Public Key Cryptosystems
    Paul, Aakash
    Datta, Somjit
    Sharma, Saransh
    Majumder, Subhashis
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 289 - 297
  • [34] CORSAIR - A SMART CARD FOR PUBLIC KEY CRYPTOSYSTEMS
    DEWALEFFE, D
    QUISQUATER, JJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 502 - 513
  • [35] ALGORITHMS FOR PUBLIC KEY CRYPTOSYSTEMS - THEORY AND APPLICATION
    LAKSHMIVARAHAN, S
    ADVANCES IN COMPUTERS, 1983, 22 : 45 - 108
  • [36] On the Differential Security of Multivariate Public Key Cryptosystems
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 130 - 142
  • [37] Key-insulated public key cryptosystems
    Dodis, Y
    Katz, J
    Xu, SH
    Yung, MT
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 65 - 82
  • [38] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [39] Efficient and secure public-key cryptosystems
    Takagi, T
    CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [40] Efficiency of public key cryptosystems as block ciphers
    Hassoun, Youssef
    Owayjan, Michel
    Counsell, Steve
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 138 - 143