Proprietary Certificates ( Extended Abstract )

نویسندگان

  • Markus Jakobsson
  • Ari Juels
  • Phong Q. Nguyen
چکیده

Certificates play an essential role in public-key cryptography, and are likely to become a cornerstone of commerce-related applications. Traditional certificates, however, are not secure against certificate lending, i.e., a situation in which a certificate holder voluntarily shares with others the rights bestowed upon him through a certificate. This type of abuse is a concern in several types of applications, such as those related to digital rights management. In this paper, we introduce the notion of proprietary and collateral certificates. We present a scheme whereby one certificate, known as a proprietary certificate, may be linked to another, known as a collateral certificate. If the owner of the proprietary certificate shares the associated private key, then the private key of the collateral certificate is simultaneously divulged. Certificates in our scheme can be integrated easily into standard PKI models and work with both RSA and discrete-log-based keys (such as those for DSS). Our scheme leaks no significant information about private keys, and leaks only a small amount of information about certificate ownership. Thus, use of proprietary certificates still allows users to maintain multiple, unlinkable pseudonyms, and adds functionality without posing any threats to user privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Theft-Protected Proprietary Certificates

The notion of proprietary certificates [7] was recently introduced in an attempt to discourage sharing of access rights to subscription-based resources. A proprietary certificate is a certificate on a public key – the so-called proprietary key – that contains some information related to another (so-called collateral) certificate and has the property that if the owner of the proprietary public k...

متن کامل

Efficient Proprietary Certification Process and Secured Theft-Protected Proprietary Certificates

This paper presents a new simple scheme for theft-protected proprietary certificate problem by introducing a mobile phone as an additional requirement for the proprietor and this scheme is analyzed to be more secured than the one presented by M. Jakobsson, et al. Secondly we present the proprietary certification process using Elliptic Curve Discrete Log Problem (ECDLP) instead of Discrete Log P...

متن کامل

Checking Foundational Proof Certificates for First-Order Logic (Extended Abstract)

We present the design philosophy of a proof checker based on a notion of foundational proof certificates. At the heart of this design is a semantics of proof evidence that arises from recent advances in the theory of proofs for classical and intuitionistic logic. That semantics is then performed by a (higher-order) logic program: successful performance means that a formal proof of a theorem has...

متن کامل

Transforming certificates of program correctness along justified program transformations

A certificate is a mathematical object that can be used to establish that a piece of mobile code satisfies some security policy. Since in general certificates cannot be generated automatically, there is an interest in developing methods to reuse certificates. This article studies methods that transform certificates of a program into certificates of another program derived from the initial one b...

متن کامل

Community College Versus Proprietary School Outcomes: Student Satisfaction Among Minority Males

In many respects, the distinctions between community colleges and proprietary schools are few. Proprietary schools (also referred to as career colleges and for-profit colleges) feature an array of vocational, technical, and business programming, as well as provide opportunities to complete general education courses (Hittman, 1995). Similarly, given that the mission of community colleges is to p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005