Skip to main content

Non-standard Certification Models for Pairing Based Cryptography

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 534))

Abstract

In the traditional Public Key Infrastructure (PKI), a Certificate Authority (CA) issues a digitally signed explicit certificate binding a user’s identity and public key to achieve this goal. The main goal of introducing an identity-based cryptosystem and certificateless cryptosystem was avoiding certificates’ management costs. In turn, the goal of introducing an implicit certificate-based cryptosystem was to solve the certificate revocation problem. The certificate and pairing based cryptography is a new technology and at present that technology mainly exists in theory and is being tested in practice. This is in contrast to PKI-based cryptography, which has been an established and is widespread technology. New types of cryptographic schemes require new non-standard certification models supporting different methods of public keys’ management, including theirs generation, certification, distribution and revocation. This paper takes a closer look at the most prominent and widely known non-standard certification models, discusses their properties and related issues. Also, we survey and classify the existing non-standard certification models proposed for digital signature schemes that are using bilinear pairings. Then we discuss and compare them with respect to some relevant criteria.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing (in Japanese). In: Symposium on Cryptography and Information Security – SCIS, Okinawa, (2000)

    Google Scholar 

  4. Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  6. Pejaś, J.: Implicit and explicit certificates-based digital signature schemes in infrastructure with multiple trust authorities (in Polish). Wyd. Stowarzyszenie Przyjaciół Wydziału Informatyki w Szczecinie. Seria: Monografie Informatyczne, Tom II, Szczecin (2013)

    Google Scholar 

  7. Hyla, T., Maćków, W., Pejaś, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Snášel, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651–666. Springer, Heidelberg (2014)

    Google Scholar 

  8. Hyla, T., Pejaś, J.: A hess-like signature scheme based on implicit and explicit certificates. Comput. J. (2016). doi:10.1093/comjnl/bxw052, http://comjnl.oxfordjournals.org/cgi/reprint/bxw052

  9. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Huang, X., Susilo, W., Mu, Y., Zhang, F.T.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Wu, W., Mu, Y., Susilo, W., Huang, X.: Certificate-based signatures revisited. J. Univ. Comput. Sci. 15(8), 1659–1684 (2009)

    MATH  Google Scholar 

  12. Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Al-Riyami, S.S.: Cryptographic Schemes based on elliptic curve pairings. Ph.D. thesis. Information Security Group, Department of Mathematics, Royal Holloway, University of London (2004)

    Google Scholar 

  16. Dubuisson, O.: ASN.1 - Communication Between Heterogeneous Systems. Academic Press, San Diego (2001)

    Google Scholar 

  17. Fray El, I., Hyla, T., Maćków, W., Pejaś J.: Authentication and authorization in multilevel security systems for public administration. Pomiary Automatyka Kontrola, vol. 56, no. 8, pp. 983–987 (2010)

    Google Scholar 

  18. Cooper, D. et al.: RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2008)

    Google Scholar 

  19. Santesson, S., et al.: RFC 6960 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (2013)

    Google Scholar 

  20. Libert, B., Quisquater, J.-J.: What is possible with identity based cryptography for PKIs and what still must be improved? In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 57–70. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Hyla, T., Bielecki, W., Pejaś, J.: Non-repudiation of electronic health records in distributed healthcare systems. Pomiary, Automatyka, Kontrola, vol. 56, no. 10, pp. 1170–1173 (2010)

    Google Scholar 

  22. Pejaś, J.: Signed electronic document and its probative value in certificate and certificateless public key cryptosystem infrastructures. Elektronika 11, 30–34 (2009)

    Google Scholar 

  23. Hyla, T., El Fray, I., Maćków, W., Pejaś, J.: Long-term preservation of digital signatures for multiple groups of related documents. IET Inf. Sec. 6(3), 219–227 (2012)

    Article  Google Scholar 

  24. Hyla, T., Pejaś, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190–205. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  25. Hyla, T., Pejaś, J.: Certificate-based encryption scheme with general access structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41–55. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  26. Desmedt, Y., Burmester, M.: Identity-based key Infrastructures (IKI). In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems, IFIP International Federation for Information Processing, vol. 147, pp. 167–176. Springer, Dordrecht (2004)

    Google Scholar 

  27. Kiltz, E., Neven, G.: Identity-based signatures. In: Joye, M., Neven, G. (eds.) Identity-Based Cryptography, pp. 31–44. IOS Press, Amsterdam (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomasz Hyla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hyla, T., Pejaś, J. (2017). Non-standard Certification Models for Pairing Based Cryptography. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48429-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48428-0

  • Online ISBN: 978-3-319-48429-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics