Identity-embedding method for decentralized public-key infrastructure

Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

研究成果: 著書/レポートタイプへの貢献会議での発言

抄録

A public key infrastructure (PKI) is for facilitating the authentication and distribution of public keys. Currently, the most commonly employed approach to PKI is to rely on certificate authorities (CAs), but recently there has been arising more need for decentralized peer-to-peer certification like Webs of Trust. In this paper, we propose an identity-embedding method suitable for decentralized PKI. By embed- ding not only ID of the candidate public-key owner itself but also IDs of his guarantors into PK, we can construct Web of guarantors on public keys. Here guarantors can be chosen arbitrarily by the candidate public- key owner. Our embedding method uses a combination of two public-key cryptosystems; the first cryptosystem is for PKI directly. Here we employ a technique to embed a string into a public key of the first cryptosystem. As such a string, we choose a concatenation of ID of a candidate public-key owner, IDs of his guarantors, and a public key of the second cryptosystem. This embedded public key of the second cryptosystem is used by the candidate public-key owner that he certainly knows the secret key that corresponds to the public key of the first cryptosystem. Then, with an aid of a broadcast mechanism of an updated public-key list on a peer-to-peer network, we can attain the decentralized PKI. Such an embedding method is concretely realized by the RSA encryption with the Lenstra’s algorithm, which can be used as the first cryptosystem. As the second cryptosystem, we employ an elliptic curve encryption whose security is equivalent to the security of the RSA encryption, where the former achieves shorter key size than the latter. We write down concrete values of parameters for a realization of the embedding.

元の言語英語
ホスト出版物のタイトルTrusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers
編集者Moti Yung, Liehuang Zhu, Yanjiang Yang
出版者Springer Verlag
ページ1-14
ページ数14
ISBN(印刷物)9783319279978
DOI
出版物ステータス出版済み - 1 1 2015
イベント6th International Conference on Trusted Systems, INTRUST 2014 - Beijing, 中国
継続期間: 12 16 201412 17 2014

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
9473
ISSN(印刷物)0302-9743
ISSN(電子版)1611-3349

その他

その他6th International Conference on Trusted Systems, INTRUST 2014
中国
Beijing
期間12/16/1412/17/14

Fingerprint

Public Key Infrastructure
Public key
Decentralized
Cryptography
Cryptosystem
Encryption
Strings
Public-key Cryptosystem
Peer to peer networks
Concatenation
Peer-to-peer Networks
Certification
Certificate
Peer to Peer
Elliptic Curves
Broadcast
Authentication
Choose

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

Anada, H., Kawamoto, J., Weng, J., & Sakurai, K. (2015). Identity-embedding method for decentralized public-key infrastructure. : M. Yung, L. Zhu, & Y. Yang (版), Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers (pp. 1-14). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9473). Springer Verlag. https://doi.org/10.1007/978-3-319-27998-5_1

Identity-embedding method for decentralized public-key infrastructure. / Anada, Hiroaki; Kawamoto, Junpei; Weng, Jian; Sakurai, Kouichi.

Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. 版 / Moti Yung; Liehuang Zhu; Yanjiang Yang. Springer Verlag, 2015. p. 1-14 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻 9473).

研究成果: 著書/レポートタイプへの貢献会議での発言

Anada, H, Kawamoto, J, Weng, J & Sakurai, K 2015, Identity-embedding method for decentralized public-key infrastructure. : M Yung, L Zhu & Y Yang (版), Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 巻. 9473, Springer Verlag, pp. 1-14, 6th International Conference on Trusted Systems, INTRUST 2014, Beijing, 中国, 12/16/14. https://doi.org/10.1007/978-3-319-27998-5_1
Anada H, Kawamoto J, Weng J, Sakurai K. Identity-embedding method for decentralized public-key infrastructure. : Yung M, Zhu L, Yang Y, 編集者, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Springer Verlag. 2015. p. 1-14. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-27998-5_1
Anada, Hiroaki ; Kawamoto, Junpei ; Weng, Jian ; Sakurai, Kouichi. / Identity-embedding method for decentralized public-key infrastructure. Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. 編集者 / Moti Yung ; Liehuang Zhu ; Yanjiang Yang. Springer Verlag, 2015. pp. 1-14 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{c1aeaab377494419a83b456c2e94bfa6,
title = "Identity-embedding method for decentralized public-key infrastructure",
abstract = "A public key infrastructure (PKI) is for facilitating the authentication and distribution of public keys. Currently, the most commonly employed approach to PKI is to rely on certificate authorities (CAs), but recently there has been arising more need for decentralized peer-to-peer certification like Webs of Trust. In this paper, we propose an identity-embedding method suitable for decentralized PKI. By embed- ding not only ID of the candidate public-key owner itself but also IDs of his guarantors into PK, we can construct Web of guarantors on public keys. Here guarantors can be chosen arbitrarily by the candidate public- key owner. Our embedding method uses a combination of two public-key cryptosystems; the first cryptosystem is for PKI directly. Here we employ a technique to embed a string into a public key of the first cryptosystem. As such a string, we choose a concatenation of ID of a candidate public-key owner, IDs of his guarantors, and a public key of the second cryptosystem. This embedded public key of the second cryptosystem is used by the candidate public-key owner that he certainly knows the secret key that corresponds to the public key of the first cryptosystem. Then, with an aid of a broadcast mechanism of an updated public-key list on a peer-to-peer network, we can attain the decentralized PKI. Such an embedding method is concretely realized by the RSA encryption with the Lenstra’s algorithm, which can be used as the first cryptosystem. As the second cryptosystem, we employ an elliptic curve encryption whose security is equivalent to the security of the RSA encryption, where the former achieves shorter key size than the latter. We write down concrete values of parameters for a realization of the embedding.",
author = "Hiroaki Anada and Junpei Kawamoto and Jian Weng and Kouichi Sakurai",
year = "2015",
month = "1",
day = "1",
doi = "10.1007/978-3-319-27998-5_1",
language = "English",
isbn = "9783319279978",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "1--14",
editor = "Moti Yung and Liehuang Zhu and Yanjiang Yang",
booktitle = "Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers",
address = "Germany",

}

TY - GEN

T1 - Identity-embedding method for decentralized public-key infrastructure

AU - Anada, Hiroaki

AU - Kawamoto, Junpei

AU - Weng, Jian

AU - Sakurai, Kouichi

PY - 2015/1/1

Y1 - 2015/1/1

N2 - A public key infrastructure (PKI) is for facilitating the authentication and distribution of public keys. Currently, the most commonly employed approach to PKI is to rely on certificate authorities (CAs), but recently there has been arising more need for decentralized peer-to-peer certification like Webs of Trust. In this paper, we propose an identity-embedding method suitable for decentralized PKI. By embed- ding not only ID of the candidate public-key owner itself but also IDs of his guarantors into PK, we can construct Web of guarantors on public keys. Here guarantors can be chosen arbitrarily by the candidate public- key owner. Our embedding method uses a combination of two public-key cryptosystems; the first cryptosystem is for PKI directly. Here we employ a technique to embed a string into a public key of the first cryptosystem. As such a string, we choose a concatenation of ID of a candidate public-key owner, IDs of his guarantors, and a public key of the second cryptosystem. This embedded public key of the second cryptosystem is used by the candidate public-key owner that he certainly knows the secret key that corresponds to the public key of the first cryptosystem. Then, with an aid of a broadcast mechanism of an updated public-key list on a peer-to-peer network, we can attain the decentralized PKI. Such an embedding method is concretely realized by the RSA encryption with the Lenstra’s algorithm, which can be used as the first cryptosystem. As the second cryptosystem, we employ an elliptic curve encryption whose security is equivalent to the security of the RSA encryption, where the former achieves shorter key size than the latter. We write down concrete values of parameters for a realization of the embedding.

AB - A public key infrastructure (PKI) is for facilitating the authentication and distribution of public keys. Currently, the most commonly employed approach to PKI is to rely on certificate authorities (CAs), but recently there has been arising more need for decentralized peer-to-peer certification like Webs of Trust. In this paper, we propose an identity-embedding method suitable for decentralized PKI. By embed- ding not only ID of the candidate public-key owner itself but also IDs of his guarantors into PK, we can construct Web of guarantors on public keys. Here guarantors can be chosen arbitrarily by the candidate public- key owner. Our embedding method uses a combination of two public-key cryptosystems; the first cryptosystem is for PKI directly. Here we employ a technique to embed a string into a public key of the first cryptosystem. As such a string, we choose a concatenation of ID of a candidate public-key owner, IDs of his guarantors, and a public key of the second cryptosystem. This embedded public key of the second cryptosystem is used by the candidate public-key owner that he certainly knows the secret key that corresponds to the public key of the first cryptosystem. Then, with an aid of a broadcast mechanism of an updated public-key list on a peer-to-peer network, we can attain the decentralized PKI. Such an embedding method is concretely realized by the RSA encryption with the Lenstra’s algorithm, which can be used as the first cryptosystem. As the second cryptosystem, we employ an elliptic curve encryption whose security is equivalent to the security of the RSA encryption, where the former achieves shorter key size than the latter. We write down concrete values of parameters for a realization of the embedding.

UR - http://www.scopus.com/inward/record.url?scp=84958055950&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84958055950&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-27998-5_1

DO - 10.1007/978-3-319-27998-5_1

M3 - Conference contribution

AN - SCOPUS:84958055950

SN - 9783319279978

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1

EP - 14

BT - Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers

A2 - Yung, Moti

A2 - Zhu, Liehuang

A2 - Yang, Yanjiang

PB - Springer Verlag

ER -