Abstract
In the context of a validation server, or more general PKI server, it could be interesting to give the server the possibility to check whether a certain public key was used. We investigate here some possibilities. We also present an escrow system as an application of the technology.
This work was supported by the funding of IWT Flanders, project: “ITEA 02011 SATURN: Security applications and technologies for universal information networks.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barbecaru, D., Lioy, A.: Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates. In: Proceedings of IEEE ISSPIT 2002 (2002)
Bellare, M., Rogaway, P.: Optimal asymmetric encryption – how to encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)
Boneh, D., Ding, X., Tsudik, G., Wong, B.: Instanteneous revocation of security capabilities. In: Proceedings of the USENIX Security Symposium 2001 (2001)
Camenish, J., Damgaard, I.: Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 331–345. Springer, Heidelberg (2000)
Coffey, T., Saidha, P.: Non-repudiation with mandatory proof of receipt. ACMCCR: Computer Rommunication Review 26
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
Guillou, L.C., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)
Herzberg, A.: Guaranteed delivery for secure electronic commerce and payments (unpublished manuscript)
Jalali-Sohi, M., Ebinger, P.: Towards Efficient PKIs for Restricted Mobile Devices. In: Proceedings of IASTED International Conference Communication and Computer Networks (2002)
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science (1979); Certified electronic mail. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.): ESORICS 1996. LNCS, vol. 1146. Springer, Heidelberg (1996)
Zhou, J., Gollman, D.: Certified electronic mail. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bechlaghem, M., Rijmen, V. (2005). Proving Key Usage. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)