TY - JOUR
T1 - Revocation-free public-key encryption based on security-mediated public-key infrastructure
AU - Lo, C. M.
AU - Hwang, T.
AU - Li, C. M.
PY - 2007/9/28
Y1 - 2007/9/28
N2 - Public-key certificates, which are used to associate public keys with certificate owner identifiers, play an important role in public-key infrastructures. Each public-key certificate must be revoked as soon as its corresponding private key is compromised, lost or invalid. Before a public key is used, its associated public-key certificate must therefore be verified to ensure that it has not been revoked. However, the revocation and revocation notification of public keys are sometimes costly in terms of communication and computation requirements. A new unimplemented public-key encryption is proposed, which allows a user to update his private key without changing the corresponding public key, so that public-key revocation and revocation verification are not needed. In addition, the proposed scheme provides the following benefits: (1) prompt disabling of decryption capability (users' decryption ability can be revoked in real time); (2) personal key privacy (users select their partial private key without exposing it to certificate authorities) and (3) chosen-ciphertext security (the proposed scheme is provably secure against adaptive chosen-ciphertext attacks, in the random oracle model).
AB - Public-key certificates, which are used to associate public keys with certificate owner identifiers, play an important role in public-key infrastructures. Each public-key certificate must be revoked as soon as its corresponding private key is compromised, lost or invalid. Before a public key is used, its associated public-key certificate must therefore be verified to ensure that it has not been revoked. However, the revocation and revocation notification of public keys are sometimes costly in terms of communication and computation requirements. A new unimplemented public-key encryption is proposed, which allows a user to update his private key without changing the corresponding public key, so that public-key revocation and revocation verification are not needed. In addition, the proposed scheme provides the following benefits: (1) prompt disabling of decryption capability (users' decryption ability can be revoked in real time); (2) personal key privacy (users select their partial private key without exposing it to certificate authorities) and (3) chosen-ciphertext security (the proposed scheme is provably secure against adaptive chosen-ciphertext attacks, in the random oracle model).
UR - http://www.scopus.com/inward/record.url?scp=34648846428&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34648846428&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs:20070045
DO - 10.1049/iet-ifs:20070045
M3 - Article
AN - SCOPUS:34648846428
SN - 1751-8709
VL - 1
SP - 134
EP - 141
JO - IET Information Security
JF - IET Information Security
IS - 3
ER -