A method for embedding secret key information in RSA public key and its application

Motoki Kitahara, Takashi Nishide, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Pages665-670
Number of pages6
DOIs
Publication statusPublished - Oct 26 2012
Event6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 - Palermo, Italy
Duration: Jul 4 2012Jul 6 2012

Publication series

NameProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

Other

Other6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
CountryItaly
CityPalermo
Period7/4/127/6/12

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Communication

Fingerprint Dive into the research topics of 'A method for embedding secret key information in RSA public key and its application'. Together they form a unique fingerprint.

  • Cite this

    Kitahara, M., Nishide, T., & Sakurai, K. (2012). A method for embedding secret key information in RSA public key and its application. In Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 (pp. 665-670). [6296934] (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012). https://doi.org/10.1109/IMIS.2012.123