{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:14:52Z","timestamp":1654118092229},"reference-count":22,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>Many cryptosystems have been developed to solve the problem of information security, and some approaches are based on the self-certified public key proposed by Girault. In Girault\u2019s scheme, the public key is computed cooperatively by both the system authority (SA) and the user. One of the advantages is that the public key is able to implicitly authenticate itself without any additional certificates. Another advantage is that the SA is not able to forge a public key without knowing the user\u2019s secret key. Despite the advantages of Girault\u2019s system, in this paper, the authors demonstrate that the system still suffers from two main weaknesses. As a result, the authors propose a slight improvement on Girault\u2019s system.<\/p>","DOI":"10.4018\/jisp.2011040104","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:28:54Z","timestamp":1319041734000},"page":"54-60","source":"Crossref","is-referenced-by-count":0,"title":["On the Security of Self-Certified Public Keys"],"prefix":"10.4018","volume":"5","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[{"name":"Fu Jen Catholic University, Taiwan"}]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[{"name":"Asia University, Taiwan"}]},{"given":"I-En","family":"Liao","sequence":"additional","affiliation":[{"name":"National Chung Hsing University, Taiwan"}]}],"member":"2432","reference":[{"key":"jisp.2011040104-0","doi-asserted-by":"crossref","unstructured":"Beth, T. (1988). A Fiat-Shamir-like authentication protocol for the ElGamal scheme. In Advances in Cryptology: Proceedings of EUROCRYPT\u201988, Davos, Switzerland (pp. 77-86).","DOI":"10.1007\/3-540-45961-8_7"},{"key":"jisp.2011040104-1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19960886"},{"key":"jisp.2011040104-2","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00080-1"},{"key":"jisp.2011040104-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"jisp.2011040104-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"jisp.2011040104-5","unstructured":"Girault, M. (1991, April 8-11). Self-certified public keys. In Advances in Cryptology: Proceedings of EUROCRYPT\u201991, Brighton, UK (pp. 491-497)."},{"issue":"3","key":"jisp.2011040104-6","first-page":"211","article-title":"On a family of minimal candidate one-way functions and one-way permutations.","volume":"8","author":"D.Gligoroski","year":"2009","journal-title":"International Journal of Network Security"},{"key":"jisp.2011040104-7","doi-asserted-by":"publisher","DOI":"10.1109\/69.991728"},{"issue":"2","key":"jisp.2011040104-8","first-page":"81","article-title":"A study of micro-payment based on one-way hash chain.","volume":"2","author":"M. S.Hwang","year":"2006","journal-title":"International Journal of Network Security"},{"key":"jisp.2011040104-9","author":"M.Kohnfelder","year":"1978","journal-title":"A method for certification (Tech. Rep.)"},{"key":"jisp.2011040104-10","unstructured":"Lee, C. C. (2001). User authentication schemes for mobile communications. Unpublished doctoral dissertation, Chaoyang University of Technology, Taiwan."},{"key":"jisp.2011040104-11","unstructured":"Lee, C. C. (2007). Mobile users\u2019 privacy and authentication in wireless communication systems. Unpublished doctoral dissertation, National Chung Hsing University, China."},{"issue":"2","key":"jisp.2011040104-12","first-page":"193","article-title":"New efficient proxy blind signature scheme using verifiable self-certified public key.","volume":"4","author":"J.Li","year":"2007","journal-title":"International Journal of Network Security"},{"key":"jisp.2011040104-13","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"jisp.2011040104-14","doi-asserted-by":"crossref","unstructured":"Saeednia, S. (1997). Identity-based and self-certified key-exchange protocols. In Proceedings of the 2nd Australasian Conference on Information Security and Privacy, Sydney, Australia (pp. 303-313).","DOI":"10.1007\/BFb0027937"},{"key":"jisp.2011040104-15","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(03)00203-5"},{"key":"jisp.2011040104-16","doi-asserted-by":"crossref","unstructured":"Saeednia, S., & Ghodosi, H. (1999). A self-certified group-oriented cryptosystem without a combiner. In Proceedings of the 4th Australasian Conference on Information Security and Privacy, Sydney, Australia (pp. 192-201).","DOI":"10.1007\/3-540-48970-3_16"},{"key":"jisp.2011040104-17","unstructured":"Schnorr, C. P. (1990, March 14-16). Key distribution system using ID-related information directory suitable for mail systems. In Proceedings of the SECURICOM\u201990 Conference, Paris, France (pp. 115-122)."},{"key":"jisp.2011040104-18","doi-asserted-by":"crossref","unstructured":"Shamir, A. (1984). Identity based cryptosystems & signature schemes. In Advances in Cryptology: Proceedings of CRYPTO\u201984, Santa Barbara, CA (pp. 47-53).","DOI":"10.1007\/3-540-39568-7_5"},{"issue":"1","key":"jisp.2011040104-19","first-page":"24","article-title":"Improvement of threshold signature using self-certified public keys.","volume":"1","author":"Z.Shao","year":"2005","journal-title":"International Journal of Network Security"},{"key":"jisp.2011040104-20","unstructured":"Tseng, Y. M., & Jan, J. K. (1999). A group signature scheme using self-certified public keys. In Proceedings of the 9th National Conference Information Security, Taichung, Taiwan (pp. 165-172)."},{"key":"jisp.2011040104-21","unstructured":"Yang, H. K., Choi, J. H., & Ann, Y. H. (1996, November 26-29). Self-certified identity information using the minimum knowledge. In Proceedings of the Digital Signal Processing Applications Conference (IEEE TENCON), Perth, WA, Australia (pp. 641-647)."}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=55379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:53:22Z","timestamp":1654116802000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2011040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2011040104","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}