Knowledge

Certificate-based encryption

Source 📝

73:
can be added to the system by requiring a new certificate to be issued as frequently as the level of security requires. Because the certificate is "public information", it does not need to be transmitted over a secret channel. The downside of this is the requirement for regular communication between
94:
movies in such a way as to make them playable only in a part of the world where they are sold. However, the fact that the region decryption key is stored on the hardware level in the DVD players substantially weakens this form of protection.
31:. This system gives the users both implicit and explicit certification, the certificate can be used as a conventional certificate (for signatures, etc.), but also implicitly for the purpose of encryption. 58:) cannot decrypt it without a currently valid certificate and also that the certificate authority cannot decrypt the message as they don't have the user's private key (i.e., there is no implicit 78:) and also that such attacks could effectively stop the system from working. This risk can be partially but not completely reduced by having a hierarchy of multiple certificate authorities. 62:
as with ID-based cryptography, as the double encryption means they cannot decrypt it solely with the information they have).Certificate is the trust between two parties.
156: 151: 146: 74:
users and the certificate authority, which means the certificate authority is more vulnerable to electronic attacks (such as
87: 75: 28: 24: 20: 70: 109: 131: 140: 121:
Craig Gentry, Certificate-Based Encryption and the Certificate Revocation Problem,
126: 86:
The best example of practical use of certificate-based encryption is
59: 104: 91: 43:
can doubly encrypt a message using another user's (
8: 7: 132:WhatsApp end-to-end data encryption 14: 157:Digital rights management systems 123:Lecture Notes in Computer Science 90:(CSS), which is used to encode 1: 17:Certificate-based encryption 152:Identity-based cryptography 125:, pp. 272 – 293, 2003 173: 54:This means that the user ( 88:Content Scrambling System 76:denial-of-service attacks 147:Public-key cryptography 19:is a system in which a 82:Practical applications 47:) public key and his ( 25:ID-based cryptography 21:certificate authority 110:Certificate server 164: 172: 171: 167: 166: 165: 163: 162: 161: 137: 136: 118: 101: 84: 68: 37: 12: 11: 5: 170: 168: 160: 159: 154: 149: 139: 138: 135: 134: 129: 117: 114: 113: 112: 107: 100: 97: 83: 80: 71:Key revocation 67: 66:Key revocation 64: 36: 33: 13: 10: 9: 6: 4: 3: 2: 169: 158: 155: 153: 150: 148: 145: 144: 142: 133: 130: 127: 124: 120: 119: 115: 111: 108: 106: 103: 102: 98: 96: 93: 89: 81: 79: 77: 72: 65: 63: 61: 57: 52: 50: 46: 42: 34: 32: 30: 27:to produce a 26: 22: 18: 122: 85: 69: 55: 53: 51:) identity. 48: 44: 40: 38: 16: 15: 29:certificate 141:Categories 116:References 99:See also 39:A user 35:Example 60:escrow 105:X.509 49:Bob's 41:Alice 23:uses 92:DVD 56:Bob 45:Bob 143:: 128:.

Index

certificate authority
ID-based cryptography
certificate
escrow
Key revocation
denial-of-service attacks
Content Scrambling System
DVD
X.509
Certificate server

WhatsApp end-to-end data encryption
Categories
Public-key cryptography
Identity-based cryptography
Digital rights management systems

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.