Inter-domain usable self-certified public key

نویسندگان

  • YOUNGSEOK CHUNG
  • SEUNGWOO LEE
  • DONGHO WON
چکیده

Both a self-certified public key and a verifiable self-certified public key need not be accompanied with a certificate to be authenticated by other users. To validate these public keys, it is required that key generation center’s public key trusted by users. If all users trust same key generation center, public key can be validated simply. But among users in different domains, trusty relationship between two key generation centers must be accomplished. In this paper we propose the inter-domain usable self-certified public key that can be validated without certificate among users under key generation centers whose trusty relationship is accomplished. Also we present the execution of signature between users under key generation centers use different public key parameters. Key-Words: self-certified, verifiable self-certified, trusty relationship, inter-domain, interoperability

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key

Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in e-cash and e-commerce. In this paper, we present a verifiable self-certified public key scheme and a proxy blind signature scheme using the verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. As far a...

متن کامل

Self-Certified Public Key Generation for Resource-Constrained Sensor Networks

It is widely acknowledged that security will play a key role in the successful design and deployment of wireless sensor networks (WSN). A prerequisite for achieving security is the ability to dynamically establish a secret key joint to two nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This letter describes an efficient ECCbased m...

متن کامل

Improvement of Threshold Signature Using Self-certified Public Keys

A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...

متن کامل

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Self-Certified keys provide an attractive alternative to traditional certificate-based public key infrastructures. Many self-certified key issuing protocols strive to blind trusted third parties to users’ private keys. One such key issuing protocol is based on the Nyberg-Rueppel signature scheme, but requires a proof of knowledge to avoid impersonation attacks. This paper describes a version of...

متن کامل

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System

In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003