Authenticity of public keys in asymmetric cryptosystems

被引:0
|
作者
Lee, WB [1 ]
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Inst Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
public key infrastructure; discrete logarithm; X.509; asymmetric cryptosystems;
D O I
10.1016/S0140-3664(97)00176-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the public key infrastructure has become increasingly important for cryptographic schemes. Little research has been done, however, on the design of public key infrastructures. Although the public key infrastructure can be solved using the current standard X.509, it has not proved to be efficient when the required security level is high. In this paper, we introduce a two-level public key infrastructure. It provides a more practical and competitive application than X.509. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:195 / 198
页数:4
相关论文
共 50 条
  • [41] A study of public key cryptosystems based on quasigroups
    Kumar, Satish
    Gupta, Indivar
    Gupta, Ashok Ji
    CRYPTOLOGIA, 2023, 47 (06) : 511 - 540
  • [42] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06): : 1683 - 1704
  • [43] Quantum asymmetric cryptography with symmetric keys
    Fei Gao
    QiaoYan Wen
    SuJuan Qin
    FuChen Zhu
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 1925 - 1931
  • [44] Asymmetric cryptography with physical unclonable keys
    Uppu, Ravitej
    Wolterink, Tom A. W.
    Goorden, Sebastianus A.
    Chen, Bin
    Skoric, Boris
    Mosk, Allard P.
    Pinkse, Pepijn W. H.
    QUANTUM SCIENCE AND TECHNOLOGY, 2019, 4 (04)
  • [45] Analysis of two knapsack public key cryptosystems
    Peng, Liqiang
    Hu, Lei
    Xu, Jun
    Xie, Yonghong
    Zuo, Jinyin
    IET COMMUNICATIONS, 2013, 7 (15) : 1638 - 1643
  • [46] Security and design of knapsack public key cryptosystems
    He, Jingmin
    Lu, Kaicheng
    Ching Hua Ta Hsueh Hsueh Pao/ Journal of Ching Hua University, 1988, 28 (01): : 89 - 97
  • [47] Quantum asymmetric cryptography with symmetric keys
    Gao Fei
    Wen QiaoYan
    Qin SuJuan
    Zhu FuChen
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (12): : 1925 - 1931
  • [48] On splitting public keys for the public key infrastructure
    Cristiano, S
    Liu, FF
    2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 112 - 115
  • [49] Pico Without Public Keys
    Stajano, Frank
    Christianson, Bruce
    Lomas, Mark
    Jenkinson, Graeme
    Payne, Jeunese
    Spencer, Max
    Stafford-Fraser, Quentin
    SECURITY PROTOCOLS XXIII, 2015, 9379 : 195 - 211
  • [50] PUBLIC HEALTH KEYS FOR THE FUTURE
    Raffensperger, Carolyn
    NEW SOLUTIONS-A JOURNAL OF ENVIRONMENTAL AND OCCUPATIONAL HEALTH POLICY, 2011, 21 (02) : 291 - 298