SELF-CERTIFIED PUBLIC KEYS

被引:0
|
作者
GIRAULT, M
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce the notion, and give two examples, of self-certified public keys, i.e. public keys which need not be accompanied with a separate certificate to be authenticated by other users. The trick is that the public key is computed by both the authority and the user, so that the certificate is ''embedded'' in the public key itself, and therefore does not take the form of a separate value. Self-certified public keys contribute to reduce the amount of storage and computations in public key schemes, while secret keys are still chosen by the user himself and remain unknown to the authority. This makes the difference with identity-based schemes, in which there are no more certificates at all, but at the cost that secret keys are computed (and therefore known to) the authority.
引用
收藏
页码:490 / 497
页数:8
相关论文
共 50 条
  • [21] A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
  • [22] Improvement of digital signature with message recovery using self-certified public keys and its variants
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (02) : 391 - 399
  • [23] ElGamal-like digital signature and multisignature schemes using self-certified public keys
    Chang, YS
    Wu, TC
    Huang, SC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 50 (02) : 99 - 105
  • [24] Digital signature with message recovery using self-certified public keys without trustworthy system authority
    Chang, YF
    Chang, CC
    Huang, HF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) : 211 - 227
  • [25] An Efficient Anonymous Batch Authenticated and Key Agreement Scheme Using Self-Certified Public Keys in VANETs
    Wang, Xinyi
    Huang, Zheng
    Wen, Qiaoyan
    Zhang, Hua
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [26] Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Wang, SB
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 78 (01) : 56 - 59
  • [27] Repairing ElGamal-like multi-signature schemes using self-certified public keys
    Hwang, SH
    Lee, YH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 156 (01) : 73 - 83
  • [28] Self-certified signatures
    Lee, B
    Kim, K
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 199 - 214
  • [29] Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
    Islam, S. K. Hafizul
    Biswas, G. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (04) : 2727 - 2750
  • [30] Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
    SK Hafizul Islam
    G. P. Biswas
    Wireless Personal Communications, 2015, 82 : 2727 - 2750