• DocumentCode
    2172189
  • Title

    Analysis on Token-Controlled Public Key Encryption

  • Author

    Changlu Lin ; Yong Li ; SRINIVASAN, SUDARSHAN ; Li Lu

  • Author_Institution
    Key Lab. of Network Security & Cryptology, Fujian Normal Univ., Fuzhou, China
  • fYear
    2012
  • fDate
    14-16 Dec. 2012
  • Firstpage
    87
  • Lastpage
    91
  • Abstract
    In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire´s will problem, the `private-opening´ commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
  • Keywords
    message authentication; public key cryptography; scheduling; TCE; authentication; electronic lotteries problem; financial scenario; legal scenario; millionaire will problem; private-opening commitment; scheduled payment problem; sealed-bid auction; token-controlled public key encryption; Public key encryption; authentication; security and privacy; token-controlled public key encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Ad-hoc and Sensor Networks (MSN), 2012 Eighth International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4673-5808-8
  • Type

    conf

  • DOI
    10.1109/MSN.2012.18
  • Filename
    6516470