DocumentCode
2172189
Title
Analysis on Token-Controlled Public Key Encryption
Author
Changlu Lin ; Yong Li ; SRINIVASAN, SUDARSHAN ; Li Lu
Author_Institution
Key Lab. of Network Security & Cryptology, Fujian Normal Univ., Fuzhou, China
fYear
2012
fDate
14-16 Dec. 2012
Firstpage
87
Lastpage
91
Abstract
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire´s will problem, the `private-opening´ commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
Keywords
message authentication; public key cryptography; scheduling; TCE; authentication; electronic lotteries problem; financial scenario; legal scenario; millionaire will problem; private-opening commitment; scheduled payment problem; sealed-bid auction; token-controlled public key encryption; Public key encryption; authentication; security and privacy; token-controlled public key encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Mobile Ad-hoc and Sensor Networks (MSN), 2012 Eighth International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4673-5808-8
Type
conf
DOI
10.1109/MSN.2012.18
Filename
6516470
Link To Document