Efficient Proprietary Certification Process and Secured Theft-Protected Proprietary Certificates

نویسنده

  • R. Anitha
چکیده

This paper presents a new simple scheme for theft-protected proprietary certificate problem by introducing a mobile phone as an additional requirement for the proprietor and this scheme is analyzed to be more secured than the one presented by M. Jakobsson, et al. Secondly we present the proprietary certification process using Elliptic Curve Discrete Log Problem (ECDLP) instead of Discrete Log Problem (DLP) for defining the relation R and we conclude that by introducing ECDLP the certification process is more efficient than DLP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Theft-Protected Proprietary Certificates

The notion of proprietary certificates [7] was recently introduced in an attempt to discourage sharing of access rights to subscription-based resources. A proprietary certificate is a certificate on a public key – the so-called proprietary key – that contains some information related to another (so-called collateral) certificate and has the property that if the owner of the proprietary public k...

متن کامل

Proprietary Certificates ( Extended Abstract )

Certificates play an essential role in public-key cryptography, and are likely to become a cornerstone of commerce-related applications. Traditional certificates, however, are not secure against certificate lending, i.e., a situation in which a certificate holder voluntarily shares with others the rights bestowed upon him through a certificate. This type of abuse is a concern in several types o...

متن کامل

Spotting Lemons in the PKI Market: Engendering Trust by Signalling Quality

Public key infrastructure (PKI) has emerged as a critical technology for identity management in e-commerce and e-government and over a hundred Certification Authorities across the globe offer certification services. Despite the passing of legislation in many countries to give equal legal weight to electronic signatures as to handwritten ones, the overall market for digital certificates has not ...

متن کامل

Damages and Benefits of Certification: A perspective from an Independent Assessment Body

The paper investigates on the nature of software certification and its reasons of being. The numerous factors that impact on the achievement of its purposes are discussed, and also compared in the cases of Proprietary Software and Open Source Software. Some relevant features of a certification process for Open Source Software are finally proposed.

متن کامل

Design and Implementation of CA/PKI on the Windows Environment

CA and PKI are crucial parts of many secure network applications. In this paper, we present our effort in the design and implementation of CA/PKI on the PC Windows environment. The Borland C++Builder 5 is used as a software tool to develop client and server software while the Microsoft SQL is used to manage X.509v3 certificates stored at CA. Our CA server is also equipped with a proprietary har...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008