A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Password Authentication Using Multiple Servers
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Fast Server-Aided RSA Signatures Secure Against Active Attacks
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Yaksha: augmenting Kerberos with public key cryptography
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Networked Cryptographic Devices Resilient to Capture
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
GSM mobile SMS/MMS using public key infrastructure: m-PKI
WSEAS Transactions on Computers
A novel software key container in on-line media services
Computers and Electrical Engineering
A Secure Authenticated Key Exchange Protocol for Credential Services
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Robust software tokens: yet another method for securing user's digital identity
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
An authentication and key exchange protocol for secure credential services
ISC'06 Proceedings of the 9th international conference on Information Security
Forward secure password-enabled PKI with instant revocation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Can hand-held computers still be better smart cards?
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
A public key infrastructure (PKI) plays an important role in utilizing a digital certificate as user's digital identifier in a reliable manner. Due to the users' demands for using their digital identifiers in places, a need for PKI roaming is rapidly growing in such a promising infrastructure. Cooperating with multiple servers must be a practical way to secure PKI roaming in software-based environments. This paper describes a new method of running RSA algorithms with a multitude of servers, in a way that a human user keeps an ID and password pair only. Our basic idea is to hide a real ID and split a password as well as a private exponent over multiple servers, so as to generate signatures or decrypt messages via the so-called virtual software tokens.