TY - GEN
T1 - Survey on certificateless public key cryptography
AU - Al Housani, Hajer
AU - Baek, Joonsang
AU - Yeun, Chan Yeob
PY - 2011
Y1 - 2011
N2 - In the notion of traditional public key infrastructure (PKI), we need to deliver public keys in an authentic way. More precisely, digital certificate binds a public key with the identity of its owner. However, significant overhead is associated with managing digital certificates. For this reason, the new notion called "identity-based public key cryptography" (ID-PKC) in which bitstring of user identity (could be name, email addresses, etc) is directly being the public key. The private key generator (PKG) is responsible for creating users private keys according to their public keys (identities). As a result, the need of certificates is eliminated because the authenticity of the public key is highly achieved. On the other hand, key escrow issue exists since PKG is able to find (calculate) any user?s private key. Can you imagine what a malicious or compromised PKG can do? In order to overcome this issue a new paradigm which is certificateless public key cryptography (CL-PKC) is introduced in which the private key is partially determined by the key generating centre (KGC). In this paper we study the first CL-PKC scheme which is proposed by Al-Riyami and Paterson.
AB - In the notion of traditional public key infrastructure (PKI), we need to deliver public keys in an authentic way. More precisely, digital certificate binds a public key with the identity of its owner. However, significant overhead is associated with managing digital certificates. For this reason, the new notion called "identity-based public key cryptography" (ID-PKC) in which bitstring of user identity (could be name, email addresses, etc) is directly being the public key. The private key generator (PKG) is responsible for creating users private keys according to their public keys (identities). As a result, the need of certificates is eliminated because the authenticity of the public key is highly achieved. On the other hand, key escrow issue exists since PKG is able to find (calculate) any user?s private key. Can you imagine what a malicious or compromised PKG can do? In order to overcome this issue a new paradigm which is certificateless public key cryptography (CL-PKC) is introduced in which the private key is partially determined by the key generating centre (KGC). In this paper we study the first CL-PKC scheme which is proposed by Al-Riyami and Paterson.
KW - certificateless cryptography
KW - identity based cryptograph
KW - public key cryptography
UR - https://www.scopus.com/pages/publications/84857464564
M3 - Conference contribution
AN - SCOPUS:84857464564
SN - 9781908320001
T3 - 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
SP - 53
EP - 58
BT - 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
T2 - 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Y2 - 11 December 2011 through 14 December 2011
ER -