Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications

被引:38
作者
Harn, Lein [1 ]
Ren, Jian [2 ]
机构
[1] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[2] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Public-key digital certificate; user authentication; key management; SIGNATURE; SCHEME; DESIGN;
D O I
10.1109/TWC.2011.042211.101913
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Public-key digital certificate has been widely used in public-key infrastructure (PKI) to provide user public key authentication. However, the public-key digital certificate itself cannot be used as a security factor to authenticate user. In this paper, we propose the concept of generalized digital certificate (GDC) that can be used to provide user authentication and key agreement. A GDC contains user's public information, such as the information of user's digital driver's license, the information of a digital birth certificate, etc., and a digital signature of the public information signed by a trusted certificate authority (CA). However, the GDC does not contain any user's public key. Since the user does not have any private and public key pair, key management in using GDC is much simpler than using public-key digital certificate. The digital signature of the GDC is used as a secret token of each user that will never be revealed to any verifier. Instead, the owner proves to the verifier that he has the knowledge of the signature by responding to the verifier's challenge. Based on this concept, we propose both discrete logarithm (DL)-based and integer factoring (IF)-based protocols that can achieve user authentication and secret key establishment.
引用
收藏
页码:2372 / 2379
页数:8
相关论文
共 30 条
[1]   Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring [J].
Biham, E ;
Boneh, D ;
Reingold, O .
INFORMATION PROCESSING LETTERS, 1999, 70 (02) :83-87
[2]  
Bohoj M., 2006, CRYPTOGRAPHY REPORT
[3]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
[4]  
Chaum D., 1996, PRIVATE SIGNATURE PR
[5]   A Note on Leakage-Resilient Authenticated Key Exchange [J].
Chun, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) :2274-2279
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]   DESIGN OF GENERALIZED ELGAMAL TYPE DIGITAL SIGNATURE SCHEMES BASED ON DISCRETE LOGARITHM [J].
HARN, L ;
XU, Y .
ELECTRONICS LETTERS, 1994, 30 (24) :2025-2026
[9]   Design of DL-based certificateless digital signatures [J].
Harn, Lein ;
Ren, Jian ;
Lin, Changlu .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) :789-793
[10]  
Huang XY, 2007, LECT NOTES COMPUT SC, V4575, P367