DocumentCode :
2172189
Title :
Analysis on Token-Controlled Public Key Encryption
Author :
Changlu Lin ; Yong Li ; SRINIVASAN, SUDARSHAN ; Li Lu
Author_Institution :
Key Lab. of Network Security & Cryptology, Fujian Normal Univ., Fuzhou, China
fYear :
2012
fDate :
14-16 Dec. 2012
Firstpage :
87
Lastpage :
91
Abstract :
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire´s will problem, the `private-opening´ commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
Keywords :
message authentication; public key cryptography; scheduling; TCE; authentication; electronic lotteries problem; financial scenario; legal scenario; millionaire will problem; private-opening commitment; scheduled payment problem; sealed-bid auction; token-controlled public key encryption; Public key encryption; authentication; security and privacy; token-controlled public key encryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Ad-hoc and Sensor Networks (MSN), 2012 Eighth International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4673-5808-8
Type :
conf
DOI :
10.1109/MSN.2012.18
Filename :
6516470
Link To Document :
بازگشت