TY - GEN
T1 - A method for embedding secret key information in RSA public key and its application
AU - Kitahara, Motoki
AU - Nishide, Takashi
AU - Sakurai, Kouichi
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.
AB - In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.
UR - http://www.scopus.com/inward/record.url?scp=84867704919&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867704919&partnerID=8YFLogxK
U2 - 10.1109/IMIS.2012.123
DO - 10.1109/IMIS.2012.123
M3 - Conference contribution
AN - SCOPUS:84867704919
SN - 9780769546841
T3 - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
SP - 665
EP - 670
BT - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
T2 - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Y2 - 4 July 2012 through 6 July 2012
ER -