TY - JOUR
T1 - RSA public keys with inside structure
T2 - Proofs of key generation and identities for web-of-trust
AU - Anada, Hiroaki
AU - Yasuda, Takanori
AU - Kawamoto, Junpei
AU - Weng, Jian
AU - Sakurai, Kouichi
N1 - Funding Information:
Concerning the first and fifth authors, this work was supported by JSPS KAKENHI Grant Numbers JP15H02711 , JP18H03240 .
Publisher Copyright:
© 2018 Elsevier Ltd
Copyright:
Copyright 2019 Elsevier B.V., All rights reserved.
PY - 2019/4
Y1 - 2019/4
N2 - We propose a construction of the modulus of the RSA public keys for decentralized public-key trust generation like Web-of-Trust, where the modulus has inside structure. The first function of the structure is that it enables a peer to verify that the owner of the public key certainly generated the corresponding secret key. The second function is to tie up the public key with the owner's identity as well as her guarantors identities. Our construction is based on the modified version of the Lenstra's algorithm, by which a related second public key and the identity strings are embedded into the RSA modulus. The second public key is of the elliptic-curve cryptosystem (ECC) which has almost equivalent security level to the RSA cryptosystem. Our construction is applicable to a peer-to-peer network equipped with the blockchain of “consortium” and “trusted” type to yield a flat network that does not depends on PKI of the X.509 type.
AB - We propose a construction of the modulus of the RSA public keys for decentralized public-key trust generation like Web-of-Trust, where the modulus has inside structure. The first function of the structure is that it enables a peer to verify that the owner of the public key certainly generated the corresponding secret key. The second function is to tie up the public key with the owner's identity as well as her guarantors identities. Our construction is based on the modified version of the Lenstra's algorithm, by which a related second public key and the identity strings are embedded into the RSA modulus. The second public key is of the elliptic-curve cryptosystem (ECC) which has almost equivalent security level to the RSA cryptosystem. Our construction is applicable to a peer-to-peer network equipped with the blockchain of “consortium” and “trusted” type to yield a flat network that does not depends on PKI of the X.509 type.
UR - http://www.scopus.com/inward/record.url?scp=85059198847&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85059198847&partnerID=8YFLogxK
U2 - 10.1016/j.jisa.2018.12.006
DO - 10.1016/j.jisa.2018.12.006
M3 - Article
AN - SCOPUS:85059198847
SN - 2214-2126
VL - 45
SP - 10
EP - 19
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
ER -