Self-certified keys — Concepts and Applications

The authenticity of public keys in an asymmetric cryptosystem can be gained in two different ways: either it is verified explicitly after knowing the public key and its certificate, e.g. X.509 certificates, or it is verified implicitly during the use of the keys. The latter concept has been introduced by Girault 1991 as self-certified keys.

[1]  Patrick Horster,et al.  A New Approach for Delegation Using Hierarchical Delegation Tokens , 1997, Communications and Multimedia Security.

[2]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[3]  David M'Raïhi,et al.  Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.

[4]  Tatsuaki Okamoto,et al.  Practical Escrow Cash System , 1996, Security Protocols Workshop.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  S. Vanstone,et al.  Improved digital signature scheme based on discrete exponentiation , 1990 .

[7]  Markus Jakobsson,et al.  Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.

[8]  Guillaume Poupard,et al.  Efficient scalable fair cash with off-line extortion prevention , 1997, ICICS.

[9]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[10]  Christoph G. Günther,et al.  An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.

[11]  A. K. Lenstra,et al.  Multi-exponentiation (cryptographic protocols) , 1994 .

[12]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[13]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..

[14]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[15]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[16]  Yacov Yacobi,et al.  On Key Distribution Systems , 1989, CRYPTO.

[17]  Patrick Horster,et al.  Meta-ElGamal signature schemes , 1994, CCS '94.

[18]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[19]  M. Mambo,et al.  Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .

[20]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[21]  M. Michels,et al.  Hidden signature schemes based on the discrete logarithm problem and related concepts , 1995 .

[22]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[23]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[24]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.