Inter-domain usable self-certified public key
نویسندگان
چکیده
Both a self-certified public key and a verifiable self-certified public key need not be accompanied with a certificate to be authenticated by other users. To validate these public keys, it is required that key generation center’s public key trusted by users. If all users trust same key generation center, public key can be validated simply. But among users in different domains, trusty relationship between two key generation centers must be accomplished. In this paper we propose the inter-domain usable self-certified public key that can be validated without certificate among users under key generation centers whose trusty relationship is accomplished. Also we present the execution of signature between users under key generation centers use different public key parameters. Key-Words: self-certified, verifiable self-certified, trusty relationship, inter-domain, interoperability
منابع مشابه
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in e-cash and e-commerce. In this paper, we present a verifiable self-certified public key scheme and a proxy blind signature scheme using the verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. As far a...
متن کاملSelf-Certified Public Key Generation for Resource-Constrained Sensor Networks
It is widely acknowledged that security will play a key role in the successful design and deployment of wireless sensor networks (WSN). A prerequisite for achieving security is the ability to dynamically establish a secret key joint to two nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This letter describes an efficient ECCbased m...
متن کاملImprovement of Threshold Signature Using Self-certified Public Keys
A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...
متن کاملBlinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Self-Certified keys provide an attractive alternative to traditional certificate-based public key infrastructures. Many self-certified key issuing protocols strive to blind trusted third parties to users’ private keys. One such key issuing protocol is based on the Nyberg-Rueppel signature scheme, but requires a proof of knowledge to avoid impersonation attacks. This paper describes a version of...
متن کاملAn ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...
متن کامل