Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Discrete Logarithms and Factoring
Discrete Logarithms and Factoring
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An efficient digital signature using self-certified public keys
InfoSecu '04 Proceedings of the 3rd international conference on Information security
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Efficient and Provably Secure Self-certified Signature Scheme
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Constructing secure mobile-agent-based consumer electronic applications
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications: An International Journal
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Self-certified mutual authentication and key exchange protocol for roaming services
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Efficient self-certified signatures with batch verification
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.89 |
In this paper, we describe an important shortcoming of the first self-certified model proposed by Girault, that may be exploited by the authority to compute users' secret keys. We also show, while it is possible to make the attack ineffective by taking additional precautions, the resulting model loses all merits of the original model and does no longer meet the primary contribution of the self-certified notion.