Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography

Byoungcheon Lee
{"title":"Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography","authors":"Byoungcheon Lee","doi":"10.1109/ARES.2010.49","DOIUrl":null,"url":null,"abstract":"Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. [4] considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship among multiple authorities, but they have not discussed more in-depth implementation issues of the hybrid scheme. In ID-based cryptography issuing private keys to users in escrow-free way had been an important issue. Lee et al. [12], [13] proposed a unique private key issuing protocol in the single authority multiple-observer (SAMO) model which can reduce the user authentication load a lot, but these schemes are subject to several attacks due to the lack of verifiable authentication of protocol messages [11].In this paper we show that these two problems can be solved by combining certificate-based and ID-based cryptography. In the proposed scheme certificate is issued to user for user-chosen public key and ID-based private key is issued to user through a private key issuing protocol. In the private key issuing protocol user is authenticated using the certificate and protocol messages are blinded using the certified public key of the user, thus the private key issuing protocol becomes private and also verifiable,which solves the authentication problem of [13].We further present the concept of unified public key infrastructure (UPKI) in which both certificate-based and ID-based cryptosystems are provided to users in a single framework. We also show that if interactions between end users are mainly executed using ID-based cryptography, then end users don’t need to manage other end users’ certificates, which is a great efficiency gain than traditional PKI.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2010.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. [4] considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship among multiple authorities, but they have not discussed more in-depth implementation issues of the hybrid scheme. In ID-based cryptography issuing private keys to users in escrow-free way had been an important issue. Lee et al. [12], [13] proposed a unique private key issuing protocol in the single authority multiple-observer (SAMO) model which can reduce the user authentication load a lot, but these schemes are subject to several attacks due to the lack of verifiable authentication of protocol messages [11].In this paper we show that these two problems can be solved by combining certificate-based and ID-based cryptography. In the proposed scheme certificate is issued to user for user-chosen public key and ID-based private key is issued to user through a private key issuing protocol. In the private key issuing protocol user is authenticated using the certificate and protocol messages are blinded using the certified public key of the user, thus the private key issuing protocol becomes private and also verifiable,which solves the authentication problem of [13].We further present the concept of unified public key infrastructure (UPKI) in which both certificate-based and ID-based cryptosystems are provided to users in a single framework. We also show that if interactions between end users are mainly executed using ID-based cryptography, then end users don’t need to manage other end users’ certificates, which is a great efficiency gain than traditional PKI.
支持基于证书和基于id的加密的统一公钥基础设施
基于证书的密码学和基于身份的密码学是在不同的理论背景下设计出来的,它们各有优缺点,但很少有作品能有效地将它们结合起来。Chen等人[4]考虑了公钥基础设施(PKI)和基于id的加密(IBE)的混合方案,也讨论了多个权威机构之间的各种信任关系,但他们没有更深入地讨论混合方案的实现问题。在基于身份的密码学中,以无托管的方式向用户发放私钥一直是一个重要问题。Lee等人[12],[13]在单权威多观察者(SAMO)模型中提出了一种唯一的私钥发布协议,可以大大减少用户的认证负荷,但由于缺乏协议消息的可验证认证,这些方案容易受到多次攻击[11]。在本文中,我们证明了这两个问题可以通过结合基于证书和基于id的加密来解决。在该方案中,通过用户选择的公钥向用户颁发证书,通过私钥颁发协议向用户颁发基于id的私钥。在私钥发布协议中,使用证书对用户进行认证,使用用户的认证公钥对协议消息进行盲化,从而使私钥发布协议具有私密性和可验证性,解决了[13]的认证问题。我们进一步提出了统一公钥基础设施(UPKI)的概念,其中在单个框架中向用户提供基于证书和基于id的密码系统。我们还表明,如果最终用户之间的交互主要使用基于id的加密技术执行,那么最终用户不需要管理其他最终用户的证书,这比传统PKI的效率提高了很多。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信