73:
can be added to the system by requiring a new certificate to be issued as frequently as the level of security requires. Because the certificate is "public information", it does not need to be transmitted over a secret channel. The downside of this is the requirement for regular communication between
94:
movies in such a way as to make them playable only in a part of the world where they are sold. However, the fact that the region decryption key is stored on the hardware level in the DVD players substantially weakens this form of protection.
31:. This system gives the users both implicit and explicit certification, the certificate can be used as a conventional certificate (for signatures, etc.), but also implicitly for the purpose of encryption.
58:) cannot decrypt it without a currently valid certificate and also that the certificate authority cannot decrypt the message as they don't have the user's private key (i.e., there is no implicit
78:) and also that such attacks could effectively stop the system from working. This risk can be partially but not completely reduced by having a hierarchy of multiple certificate authorities.
62:
as with ID-based cryptography, as the double encryption means they cannot decrypt it solely with the information they have).Certificate is the trust between two parties.
156:
151:
146:
74:
users and the certificate authority, which means the certificate authority is more vulnerable to electronic attacks (such as
87:
75:
28:
24:
20:
70:
109:
131:
140:
121:
Craig Gentry, Certificate-Based
Encryption and the Certificate Revocation Problem,
126:
86:
The best example of practical use of certificate-based encryption is
59:
104:
91:
43:
can doubly encrypt a message using another user's (
8:
7:
132:WhatsApp end-to-end data encryption
14:
157:Digital rights management systems
123:Lecture Notes in Computer Science
90:(CSS), which is used to encode
1:
17:Certificate-based encryption
152:Identity-based cryptography
125:, pp. 272 – 293, 2003
173:
54:This means that the user (
88:Content Scrambling System
76:denial-of-service attacks
147:Public-key cryptography
19:is a system in which a
82:Practical applications
47:) public key and his (
25:ID-based cryptography
21:certificate authority
110:Certificate server
164:
172:
171:
167:
166:
165:
163:
162:
161:
137:
136:
118:
101:
84:
68:
37:
12:
11:
5:
170:
168:
160:
159:
154:
149:
139:
138:
135:
134:
129:
117:
114:
113:
112:
107:
100:
97:
83:
80:
71:Key revocation
67:
66:Key revocation
64:
36:
33:
13:
10:
9:
6:
4:
3:
2:
169:
158:
155:
153:
150:
148:
145:
144:
142:
133:
130:
127:
124:
120:
119:
115:
111:
108:
106:
103:
102:
98:
96:
93:
89:
81:
79:
77:
72:
65:
63:
61:
57:
52:
50:
46:
42:
34:
32:
30:
27:to produce a
26:
22:
18:
122:
85:
69:
55:
53:
51:) identity.
48:
44:
40:
38:
16:
15:
29:certificate
141:Categories
116:References
99:See also
39:A user
35:Example
60:escrow
105:X.509
49:Bob's
41:Alice
23:uses
92:DVD
56:Bob
45:Bob
143::
128:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.