Abstract
In the traditional Public Key Infrastructure (PKI), a Certificate Authority (CA) issues a digitally signed explicit certificate binding a user’s identity and public key to achieve this goal. The main goal of introducing an identity-based cryptosystem and certificateless cryptosystem was avoiding certificates’ management costs. In turn, the goal of introducing an implicit certificate-based cryptosystem was to solve the certificate revocation problem. The certificate and pairing based cryptography is a new technology and at present that technology mainly exists in theory and is being tested in practice. This is in contrast to PKI-based cryptography, which has been an established and is widespread technology. New types of cryptographic schemes require new non-standard certification models supporting different methods of public keys’ management, including theirs generation, certification, distribution and revocation. This paper takes a closer look at the most prominent and widely known non-standard certification models, discusses their properties and related issues. Also, we survey and classify the existing non-standard certification models proposed for digital signature schemes that are using bilinear pairings. Then we discuss and compare them with respect to some relevant criteria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing (in Japanese). In: Symposium on Cryptography and Information Security – SCIS, Okinawa, (2000)
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)
Pejaś, J.: Implicit and explicit certificates-based digital signature schemes in infrastructure with multiple trust authorities (in Polish). Wyd. Stowarzyszenie Przyjaciół Wydziału Informatyki w Szczecinie. Seria: Monografie Informatyczne, Tom II, Szczecin (2013)
Hyla, T., Maćków, W., Pejaś, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Snášel, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651–666. Springer, Heidelberg (2014)
Hyla, T., Pejaś, J.: A hess-like signature scheme based on implicit and explicit certificates. Comput. J. (2016). doi:10.1093/comjnl/bxw052, http://comjnl.oxfordjournals.org/cgi/reprint/bxw052
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Huang, X., Susilo, W., Mu, Y., Zhang, F.T.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)
Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures revisited. J. Univ. Comput. Sci. 15(8), 1659–1684 (2009)
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)
Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007)
Al-Riyami, S.S.: Cryptographic Schemes based on elliptic curve pairings. Ph.D. thesis. Information Security Group, Department of Mathematics, Royal Holloway, University of London (2004)
Dubuisson, O.: ASN.1 - Communication Between Heterogeneous Systems. Academic Press, San Diego (2001)
Fray El, I., Hyla, T., Maćków, W., Pejaś J.: Authentication and authorization in multilevel security systems for public administration. Pomiary Automatyka Kontrola, vol. 56, no. 8, pp. 983–987 (2010)
Cooper, D. et al.: RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2008)
Santesson, S., et al.: RFC 6960 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (2013)
Libert, B., Quisquater, J.-J.: What is possible with identity based cryptography for PKIs and what still must be improved? In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 57–70. Springer, Heidelberg (2004)
Hyla, T., Bielecki, W., Pejaś, J.: Non-repudiation of electronic health records in distributed healthcare systems. Pomiary, Automatyka, Kontrola, vol. 56, no. 10, pp. 1170–1173 (2010)
Pejaś, J.: Signed electronic document and its probative value in certificate and certificateless public key cryptosystem infrastructures. Elektronika 11, 30–34 (2009)
Hyla, T., El Fray, I., Maćków, W., Pejaś, J.: Long-term preservation of digital signatures for multiple groups of related documents. IET Inf. Sec. 6(3), 219–227 (2012)
Hyla, T., Pejaś, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190–205. Springer, Heidelberg (2013)
Hyla, T., Pejaś, J.: Certificate-based encryption scheme with general access structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41–55. Springer, Heidelberg (2012)
Desmedt, Y., Burmester, M.: Identity-based key Infrastructures (IKI). In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems, IFIP International Federation for Information Processing, vol. 147, pp. 167–176. Springer, Dordrecht (2004)
Kiltz, E., Neven, G.: Identity-based signatures. In: Joye, M., Neven, G. (eds.) Identity-Based Cryptography, pp. 31–44. IOS Press, Amsterdam (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hyla, T., Pejaś, J. (2017). Non-standard Certification Models for Pairing Based Cryptography. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-48429-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48428-0
Online ISBN: 978-3-319-48429-7
eBook Packages: EngineeringEngineering (R0)