ElGamal-like digital signature and multisignature schemes using self-certified public keys
Journal of Systems and Software
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
A Self-Certified Group-Oriented Cryptosystem Without a Combiner
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Hi-index | 0.00 |
Many cryptosystems have been developed to solve the problem of information security, and some approaches are based on the self-certified public key proposed by Girault. In Girault's scheme, the public key is computed cooperatively by both the system authority SA and the user. One of the advantages is that the public key is able to implicitly authenticate itself without any additional certificates. Another advantage is that the SA is not able to forge a public key without knowing the user's secret key. Despite the advantages of Girault's system, in this paper, the authors demonstrate that the system still suffers from two main weaknesses. As a result, the authors propose a slight improvement on Girault's system.