A Modified Securities Model Based on Public Key Infrastructure

This paper describes a modified securities model and a modified key management protocol based on Public Key Infrastructure (PKI) which aims to answer these questions that how to solve the security problem between the client operation and service operation. It illustrates the model by presenting rule security system for a variety of applications, and proposes a modified key management protocol between ECC-CA (Elliptic Curve Cryptography-Certificate Authority) and ECC-KM (Elliptic Curve Cryptography-Key Management). Our aim is to show the modified securities rules in operation that the traditional business management system can not operate.

[1]  Dan Boneh,et al.  The Decision Diffie-Hellman Problem , 1998, ANTS.

[2]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[3]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[4]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[5]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[6]  Feng Ye,et al.  A Modification on Public Key Infrastructure Application , 2009, 2009 International Conference on E-Business and Information System Security.

[7]  Loren M. Kohnfelder,et al.  Towards a practical public-key cryptosystem. , 1978 .

[8]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Hugo Krawczyk,et al.  Advances in Cryptology - CRYPTO '98 , 1998 .

[11]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[12]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[13]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[14]  Dan Boneh,et al.  Breaking RSA May Not Be Equivalent to Factoring , 1998, EUROCRYPT.

[15]  Ernest F. Brickell,et al.  Design Validations for Discrete Logarithm Based Signature Schemes , 2000, Public Key Cryptography.

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..