O'Reilly logo

Modern Cryptography: Theory and Practice by Wenbo Mao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Authentication Framework for Public-Key Cryptography

13.1 Introduction

In the usual sense of public-key cryptography, a key generation procedure invariantly contains the following step:

Image

Here, F is some efficient and one-way function which maps from the private key space to the public-key space. Due to the one-way property of the function F (a good mixing-transformation), public-key computed from private-key always contains a part which looks random.

With every public key containing a random-looking part, it is obviously necessary that a principal’s public key be associated with the principal’s identity information in a verifiable ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required