Catálogo de publicaciones - libros

Compartir en
redes sociales


Public Key Cryptography: PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings

Tatsuaki Okamoto ; Xiaoyun Wang (eds.)

En conferencia: 10º International Workshop on Public Key Cryptography (PKC) . Beijing, China . April 16, 2007 - April 20, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Engineering; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Computers and Society; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-71676-1

ISBN electrónico

978-3-540-71677-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Self-Generated-Certificate Public Key Encryption Without Pairing

Junzuo Lai; Weidong Kou

Certificateless Public Key Cryptography (CL-PKC) has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). However, it does suffer to the Denial-of-Decryption (DoD) Attack called by Liu and Au [1], as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, they introduced a new paradigm called Self-Generated-Certificate Public Key Cryptography (SGC-PKC) that captured the DoD Attack and proposed a first scheme derived from a novel application of Water’s Identity-Based Encryption scheme. In this paper, we propose a new SGC-PKE scheme that does not depend on the bilinear pairings, which make it be more efficient and more short public keys than Liu and Au’s scheme. More importantly, our scheme reaches Girault’s trusted level 3 (cf. Girault’s trusted level 2 of Liu and Au’s scheme), the same level as is enjoyed in a traditional PKI.

- Public-Key Infrastructure | Pp. 476-489