A method for embedding secret key information in RSA public key and its application

Motoki Kitahara, Takashi Nishide, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Pages665-670
Number of pages6
DOIs
Publication statusPublished - 2012
Event6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 - Palermo, Italy
Duration: Jul 4 2012Jul 6 2012

Publication series

NameProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

Other

Other6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Country/TerritoryItaly
CityPalermo
Period7/4/127/6/12

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Communication

Fingerprint

Dive into the research topics of 'A method for embedding secret key information in RSA public key and its application'. Together they form a unique fingerprint.

Cite this