A PKI System for Detecting the Exposure of a User’s Secret Key

  • Younggyo Lee
  • Jeonghee Ahn
  • Seungjoo Kim
  • Dongho Won
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4043)

Abstract

Dodis et al proposed a key-insulated signature scheme in 2003. The scheme can minimize the damage caused by the secret key’s exposure but can not protect the user from the secret key’s exposure perfectly. We propose a PKI system which can detect immediately even a single illegitimate signature due to the exposure of a user’s secret key. The system uses the one-time hash chain based on NOVOMODO and can prevent the users from compromising the secret key more perfectly and effectively than the key-insulated signature scheme.

Keywords

key-insulated signature one-time hash chain NOVOMODO 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Micali, S.: NOVOMODO; Scable Certificate Validation And Simplified PKI Management. In: 1st Annual PKI Research Workshop Preproceedings, pp.15–25 (2002)Google Scholar
  2. 2.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–142. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Lee, Y., Kim, I.J., Kim, S., Won, D.H.: A Method for Detecting the Exposure of OCSP Responder’s Session Private Key in D-OCSP-KIS. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 215–226. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Lee, Y., Ahn, J., Kim, S., Won, D.: A Method for Detecting the Exposure of an OCSP Responder’s Private Key using One-Time Hash Value. IJCSNS International Journal of Computer Science and Network Security 5(8), 179–186 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Younggyo Lee
    • 1
  • Jeonghee Ahn
    • 2
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Information Security GroupSungkyunkwan UniversityKorea
  2. 2.Department of Computer ScienceDoowon Technical CollegeKorea

Personalised recommendations