Self-certiied Keys { Concepts and Applications

نویسندگان

  • Holger Petersen
  • Patrick Horster
چکیده

The authenticity of public keys in an asymmetric cryptosystem can be gained in two di erent ways: either it is veri ed explicitly after knowing the public key and its certi cate, e.g. X.509 certi cates, or it is veri ed implicitly during the use of the keys. The latter concept has been introduced by Girault 1991 as self-certi ed keys. In this paper we extend this concept: We show how to issue self-certi ed keypairs under di erent trust levels and show how to use them in authentication trees. Then we demonstrate, how a user can switch his keys to enhance the security of his actual secret key against compromising. We illustrate the relevance of all concepts by discussing several useful applications. Among them are delegation of rights, delegated signatures, delegated encryption and electronic voting schemes. Furthermore, we propose a new non-interactive key exchange protocol, that provides backward and forward secrecy of session keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Short Note on Girault's Self-certiied Model

In this paper, we describe an important shortcoming of the rst self-certiied model proposed by Girault, that may be exploited by the authority to compute users' secret keys. We also propose to take additional precautions to make the attack ineeective.

متن کامل

Hidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts Hidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...

متن کامل

A Self-Certified Group-Oriented Cryptosystem Without a Combiner

In a (t;n) group-oriented cryptosystem, collaboration of at least t participants is required to perform the group transformation. Two important issues in implementation of a such cryptosystems are: 1. the sender needs to collect authenticated public keys of the intended receivers; 2. the combiner needs a secure channel to collect (privately) the partial results from collaborating participants. ...

متن کامل

A New Approach for Delegation Using Hierarchical Delegation Tokens

In this paper we give a classiication of delegation schemes into four main classes. To solve the problem with simply chained tokens in cascaded delegations we introduce the concept of hierarchical delegation tokens. To realize this concept we use the Schnorr signature scheme and self{certiied public keys introduced by Girault. We describe the rst approach for hierarchical key generation based o...

متن کامل

Secure Communication in an Unknown Network Using Certificates

We consider the problem of secure communication in a network with malicious (Byzantine) faults for which the trust graph, with vertices the processors and edges corresponding to certiied public keys, is not known except possibly to the adversary. This scenario occurs in several models. For example, in survivability models in which certifying authorities may be corrupted, or in networks which ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997