Electronic Signature System with Small Number of Private Keys
نویسندگان
چکیده
We propose a simple server-based electronic signature system in which a small number of common private keys are used. The motivation of such a system is to escape the scalability and complexity problems that arise if a large-scale Public Key Infrastructure (PKI) is used. We argue that the assumption of personal private keys is the main reason for those problems and high cost of electronic signature systems. We conclude that elimination of personal private keys is justified and further argue that this does not reduce the security.
منابع مشابه
- 1 - Attack on Private Signature Keys of the
The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a number of applications including PGP, GNU Privacy Guard and other programs specified on the list of products compatible with OpenPGP, which is available at http://www.pgpi.org/products. Therefore all these applications must und...
متن کاملAttack on Private Signature Keys
The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a number of applications including PGP, GNU Privacy Guard and other programs specified on the list of products compatible with OpenPGP, which is available at http://www.pgpi.org/products. Therefore all these applications must und...
متن کاملScheme DSS [ NIST ] AMV [ AMV ]
Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for worldwide scale security solutions. On the other hand, these solutions clearly expose the fact that the protection of private keys is a security bottleneck in these sensitive applications. This problem is further wors...
متن کاملSmall Private Key PKS on an Embedded Microprocessor
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a sma...
متن کاملDigital Signatures, Certificates and Electronic Commerce
Cryptography as practised for 3500 years before the mid-1970s used one secret, known by both the enciphering and deciphering parties. Anyone possessing that secret (called the key) was able to do either operation. In public key cryptography there are two different keys, one used to encipher data and the other used to decipher it. While one of these keys is kept private, the other is made public...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003