|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
9 July 1997
Source: Mail list cypherpunks@algebra.net
To: <cypherpunks@algebra.com>
From: Theodor.SCHLICKMANN@BXL.DG13.cec.be
Date: Wed, 9 Jul 1997 09:12:53 +0200
Subject: Self-certified keysYou may find some articles related to the subject on http://www.ens.fr/~petersen/publications.html In these papers several extensions of self-certified keys, which make them more competitive compared with certificate-based keys are presented. The main features of self-certified keys lie in their easy availability and accessibility. Other parameters than system parameters are not required to be authentic. Therefore large databases with certified public keys (TTPs) are not needed any more. However, small lists with the authentic public keys of the certification authorities are still needed. The properties of self-certified keys are: -- Determination of a public key without an authentic public directory (TTP). -- Non-repudiation of public keys. -- Efficient verification of a single certificate. -- Efficiency in verification of hierarchical certificates vs. batch signatures -- Importance of key propagation. -- High security of self-certified keys. Theodor Schlickmann