Public-Key Certificate Management and Use Cases

Author(s):  
Paul C. van Oorschot
2008 ◽  
pp. 228-256
Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and or-ganizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government ser-vices that have been designed based on a common and systematic approach. The prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly un-derstood that Web services in combination with public key infrastructures may provide the necessary solutions. In this context, this chapter presents three innova-tive e-government services based on these technologies, focusing on their security and interoperability aspects. The goal of the chapter is to demonstrate the ser-vices’ specifications and use cases so that they may act as examples for further re-search and development.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Rui Guo ◽  
Qiaoyan Wen ◽  
Huixian Shi ◽  
Zhengping Jin ◽  
Hua Zhang

Certificateless cryptography aims at combining the advantages of public key cryptography and identity based cryptography to avoid the certificate management and the key escrow problem. In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem and factoring the large number as in an RSA protocol. Moreover, since our scheme requires only one pairing operation in decryption, it is significantly more efficient than other related schemes. In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes.


Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and organizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government services that have been designed based on a common and systematic approach. The most prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly understood that Web Services in combination with Public Key Infrastructures may provide the necessary solutions. In this context, this paper presents three innovative e-government services based on these technologies, fo-cusing on their security and interoperability aspects. The goal of the paper is to demonstrate the services’ specifications and use cases so that they may act as ex-amples for further research and development.


2020 ◽  
Vol 4 (1) ◽  
pp. 19-21
Author(s):  
Yakubu Ajiji Makeri

Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme. Identity-based (ID-based) cryptography is very useful because it simplifies certificate management in public-key cryptocurrency. For the design of the Integrated File Level Cryptographic Access Control (IFLCAC) system, it makes file security much easier for the end-user. This system combines the advantages of traditional file-level cryptography and full-disc cryptography systems, making it safe and easy to use. We first look at existing file cryptography systems, compare them to two, and then describe the interactions between components and components of the integrated file-level cryptographic access control system. Because its defense relies on the difficulty of discrete logarithmic and integer factor problems, it proves that his scheme is safe against favorable select-plain invasion. We show that this new ID-based encryption scheme is not secure by introducing a method to retrieve the secret master key.


Sign in / Sign up

Export Citation Format

Share Document