Public-Key Cryptosystems with Secret Encryptor and Digital Signature
نویسندگان
چکیده
منابع مشابه
Public Key Cryptosystems with Noisy Secret Keys
Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...
متن کاملProactive Secret Sharing and Public Key Cryptosystems
Secret sharing schemes protect secrecy and integrity of information by dividing it into shares and distributing these shares among different locations. In k + 1 out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary compromises no more than k of the n locations. For long-lived and sensitive secrets this protection may be insufficient. We p...
متن کاملOn multivariate signature-only public key cryptosystems
In a paper published at Asiacrypt 2000 a signature scheme that (apparently) cannot be abused for encryption is published. The problem is highly non-trivial and every solution should be looked upon with caution. What is especially hard to achieve is to avoid that the public key should leak some information, to be used as a possible ”shadow” secondary public key. In the present paper we argument ...
متن کاملDigital signature and public key cryptosystems in a prime order subgroup of Zn*
A new digital signature scheme and public key cryptosystem are proposed which use operations in a prime order subgroup of Z n for a composite number n. There are similarities with the best known digital signatures and public key cryptosystems (RSA and discrete logarithm based schemes) in terms of the mathematical structure. With regard to computational requirements the new schemes are competiti...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communications, Network and System Sciences
سال: 2013
ISSN: 1913-3715,1913-3723
DOI: 10.4236/ijcns.2013.61001