Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
Autor: | Galindo Chacon, D., Morillo, Paz, Ràfols, Carla, Atzeni, Andrea S., Lioy, Antonio |
---|---|
Přispěvatelé: | Atzeni, Andrea S., Lioy, Antonio |
Rok vydání: | 2006 |
Předmět: |
Public key certificate
Computer science Internet privacy Key distribution Identity-based encryption Cryptography Access control Encryption Certificate-based encryption Self-signed certificate Computer security computer.software_genre law.invention Cryptanalysis Public-key cryptography Certificate-based and certificate-less encryption ID-based cryptography law Financial cryptography Certificate authority Cryptography law Security of Systems Key exchange Key generation Revocation list business.industry Key space Public key infrastructure Certificate Public-key infrastructure Root certificate Lect. Notes Comp. Sci Key (cryptography) business Implicit certificate computer Key escrow |
Zdroj: | Public Key Infrastructure ISBN: 9783540351511 EuroPKI Scopus-Elsevier Atzeni, Andrea S.; Lioy, Antonio (ed.), Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 81-91 Atzeni, Andrea S.; Lioy, Antonio (ed.), Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, 81-91. Berlin ; New York : Springer STARTPAGE=81;ENDPAGE=91;TITLE=Atzeni, Andrea S.; Lioy, Antonio (ed.), Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings |
DOI: | 10.1007/11774716_7 |
Popis: | Comunicació presentada a: The Third European PKI Workshop: theory and practice, EuroPKI 2006, celebrat del 19 al 20 de juny de 2006 a Turin, Itàlia. Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify itself to a trusted authority in order to obtain the secret key corresponding to its identity. The main drawback of this special form of public key cryptography is that it is key escrowed. Certificate-based and certificate-less cryptography have been recently proposed as intermediate paradigms between traditional and identity-based cryptography, seeking to simplify the management of certificates while avoiding the key escrow property of identity-based cryptography. In this work we cryptanalyse the certificate-based and certificate-less encryption schemes presented by Yum and Lee at EuroPKI 2004 and ICCSA 2004 conferences. |
Databáze: | OpenAIRE |
Externí odkaz: |