• DocumentCode
    3322663
  • Title

    Secure and efficient schemes to entrust the use of private keys

  • Author

    Shin, Kil-Ho ; Kyojima, Masaki

  • Author_Institution
    IT Bus. Dev. Dept., Fuji Xerox Co. Ltd., Kanagawa, Japan
  • fYear
    1999
  • fDate
    1999
  • Firstpage
    174
  • Lastpage
    177
  • Abstract
    This paper presents a practical method which enables an owner of a private key to entrust the use of the key to an entrustee without exposing the actual key. The following are features of the method: it covers a wide variety of existing public-key cryptographic algorithms; it provides the owner of the private key with a means of preventing the entrustee from abusing the entrusted key beyond the limits which the key owner arbitrarily specifies; it only adds a very small, usually negligible, amount of overhead to calculations required in the base public-key cryptographic algorithm. An outline of our method is as follows. An owner of a private key issues to an entrustee data called a ticket through the cooperation of a trusted third party. With the ticket, the entrustee can execute calculations, which yield the same results as those using the actual private key do
  • Keywords
    public key cryptography; calculations; private keys; public-key cryptography; ticket; trusted third party; Companies; Digital signatures; Internet; Layout; Marketing and sales; Public key; Public key cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999. (WET ICE '99) Proceedings. IEEE 8th International Workshops on
  • Conference_Location
    Stanford, CA
  • ISSN
    1080-1383
  • Print_ISBN
    0-7695-0365-9
  • Type

    conf

  • DOI
    10.1109/ENABL.1999.805195
  • Filename
    805195