A PKI system for detecting the exposure of a user's secret key

Younggyo Lee, Jeonghee Ahn, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages248-250
Number of pages3
Volume4043 LNCS
Publication statusPublished - 2006 Jul 27
Externally publishedYes
EventThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006 - Turin, Italy
Duration: 2006 Jun 192006 Jun 20

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4043 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006
CountryItaly
CityTurin
Period06/6/1906/6/20

    Fingerprint

Keywords

  • Key-insulated signature
  • NOVOMODO
  • One-time hash chain

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Lee, Y., Ahn, J., Kim, S-J., & Won, D. (2006). A PKI system for detecting the exposure of a user's secret key. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4043 LNCS, pp. 248-250). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4043 LNCS).