A PKI system for detecting the exposure of a user's secret key

Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key's exposure but can not protect the user from the secret key's exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user's secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

Original languageEnglish
Title of host publicationPublic Key Infrastructure
Subtitle of host publicationThird European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
PublisherSpringer Verlag
Pages248-250
Number of pages3
ISBN (Print)3540351515, 9783540351511
DOIs
Publication statusPublished - 2006
EventThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006 - Turin, Italy
Duration: 2006 Jun 192006 Jun 20

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4043 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006
CountryItaly
CityTurin
Period06/6/1906/6/20

Keywords

  • Key-insulated signature
  • NOVOMODO
  • One-time hash chain

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A PKI system for detecting the exposure of a user's secret key'. Together they form a unique fingerprint.

  • Cite this

    Lee, Y., Ahn, J., Kim, S., & Won, D. (2006). A PKI system for detecting the exposure of a user's secret key. In Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings (pp. 248-250). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4043 LNCS). Springer Verlag. https://doi.org/10.1007/11774716_20