A PKI system for detecting the exposure of a user's secret key

Younggyo Lee, Jeonghee Ahn, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages248-250
Number of pages3
Volume4043 LNCS
Publication statusPublished - 2006 Jul 27
Externally publishedYes
EventThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006 - Turin, Italy
Duration: 2006 Jun 192006 Jun 20

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4043 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006
CountryItaly
CityTurin
Period06/6/1906/6/20

Fingerprint

Signature Scheme
Hash Chain
Immediately
Signature
Damage
Minimise

Keywords

  • Key-insulated signature
  • NOVOMODO
  • One-time hash chain

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Lee, Y., Ahn, J., Kim, S-J., & Won, D. (2006). A PKI system for detecting the exposure of a user's secret key. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4043 LNCS, pp. 248-250). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4043 LNCS).

A PKI system for detecting the exposure of a user's secret key. / Lee, Younggyo; Ahn, Jeonghee; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4043 LNCS 2006. p. 248-250 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4043 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, Y, Ahn, J, Kim, S-J & Won, D 2006, A PKI system for detecting the exposure of a user's secret key. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4043 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4043 LNCS, pp. 248-250, Third European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006, Turin, Italy, 06/6/19.
Lee Y, Ahn J, Kim S-J, Won D. A PKI system for detecting the exposure of a user's secret key. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4043 LNCS. 2006. p. 248-250. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lee, Younggyo ; Ahn, Jeonghee ; Kim, Seung-Joo ; Won, Dongho. / A PKI system for detecting the exposure of a user's secret key. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4043 LNCS 2006. pp. 248-250 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{54b5d87f7a194e7a93c164b5c204aa6c,
title = "A PKI system for detecting the exposure of a user's secret key",
abstract = "Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.",
keywords = "Key-insulated signature, NOVOMODO, One-time hash chain",
author = "Younggyo Lee and Jeonghee Ahn and Seung-Joo Kim and Dongho Won",
year = "2006",
month = "7",
day = "27",
language = "English",
isbn = "3540351515",
volume = "4043 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "248--250",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - A PKI system for detecting the exposure of a user's secret key

AU - Lee, Younggyo

AU - Ahn, Jeonghee

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2006/7/27

Y1 - 2006/7/27

N2 - Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

AB - Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

KW - Key-insulated signature

KW - NOVOMODO

KW - One-time hash chain

UR - http://www.scopus.com/inward/record.url?scp=33746210215&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33746210215&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540351515

SN - 9783540351511

VL - 4043 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 248

EP - 250

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -