loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Author: Apostolos P. Fournaris

Affiliation: University of Patras, Greece

ISBN: 978-989-8565-24-2

Keyword(s): Threshold Cryptography, Certificate based Encryption, Elliptic Curve Cryptography, Pairing based Cryptography, Distributed System, Certificate Authority.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Security in Distributed Systems

Abstract: Generating certified keys and managing certification information in a fully distributed manner can find a wide range of applications in the increasingly distributed IT environment. However, the prohibition of trusted entities within the distributed system and the high complexity certificate management and revocation mechanism, hinder the adoption of this approach in a large scale. Threshold cryptography offers an elegant solution to these issues through Shamir’s secret sharing scheme, where a secret (the Certificate Authority’s (CA) master key) is split and shared among all participants. Combining this approach with the reasonable certificate service requirements of Certificate based encryption (CBE) schemes could result in a functional and efficient distributed security scheme. However, centralized entities, denoted as trusted dealers, are needed in most threshold cryptography schemes even those few that support CBE, while the static way in which the system’s functionality is viewed, considerably limits possible applications (i.e. dynamic environments like p2p, Ad- Hoc networks, MANETS). In this paper, we explore the potentials of combining the latest developments in distributed key generation threshold cryptography schemes with efficient yet highly secure certificate based encryption schemes in order to provide a solution that matches the above concerns. We draft a fully distributed Threshold Certificate Based Encryption Scheme that has no need for any centralized entity at any point during its operating cycle, has few requirements concerning certificate management due to CBE and does not need any trusted dealer to create, and split secrets or distribute certificates. The proposed scheme has an easy participant addition-removal procedure to support dynamic environments. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.91.106.223

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
P. Fournaris, A. (2012). Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 314-320. DOI: 10.5220/0004075803140320

@conference{secrypt12,
author={Apostolos P. Fournaris.},
title={Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={314-320},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004075803140320},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer
SN - 978-989-8565-24-2
AU - P. Fournaris, A.
PY - 2012
SP - 314
EP - 320
DO - 10.5220/0004075803140320

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.