DocumentCode :
1959283
Title :
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography
Author :
Lee, Byoungcheon
Author_Institution :
Dept. of Inf. Security, Joongbu Univ., Chungnam, South Korea
fYear :
2010
fDate :
15-18 Feb. 2010
Firstpage :
54
Lastpage :
61
Abstract :
Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship among multiple authorities, but they have not discussed more in-depth implementation issues of the hybrid scheme. In ID-based cryptography issuing private keys to users in escrow-free way had been an important issue. Lee et al. proposed a unique private key issuing protocol in the single authority multiple-observer (SAMO) model which can reduce the user authentication load a lot, but these schemes are subject to several attacks due to the lack of verifiable authentication of protocol messages. In this paper we show that these two problems can be solved by combining certificate-based and ID-based cryptography. In the proposed scheme certificate is issued to user for user-chosen public key and ID-based private key is issued to user through a private key issuing protocol. In the private key issuing protocol user is authenticated using the certificate and protocol messages are blinded using the certified public key of the user, thus the private key issuing protocol becomes private and also verifiable,which solves the authentication problem of. We further present the concept of unified public key infrastructure (UPKI) in which both certificate-based and ID-based cryptosystems are provided to users in a single framework. We also show that if interactions between end users are mainly executed using ID-based cryptography, then end users don´t need to manage other end users´ certificates, which is a great efficiency gain than traditional PKI.
Keywords :
cryptographic protocols; public key cryptography; ID based cryptography; certificate based cryptography; cryptosystems; escrow free way; private key issuing protocol; single authority multiple observer model; trust relationship; unified public key infrastructure; user authentication; Authentication; Availability; Certification; Cryptographic protocols; Hybrid power systems; Identity-based encryption; Information security; Public key; Public key cryptography; Reliability theory; Bilinear pairing; Certificate-based cryptography; Hybrid cryptography; ID-based cryptography; Key generation and certification authority; Key privacy agent; Private key issuing protocol; Unified public key infrastructure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
Conference_Location :
Krakow
Print_ISBN :
978-1-4244-5879-0
Type :
conf
DOI :
10.1109/ARES.2010.49
Filename :
5438114
Link To Document :
بازگشت