A method for fast revocation of public key certificates and security capabilities

被引:0
|
作者
Boneh, D [1 ]
Ding, XH [1 ]
Tsudik, G [1 ]
Wong, CM [1 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
来源
USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant, of the RSA cryptosystem (mediated RSA) offers a number of practical advantages over current, revocation techniques. Our approach simplifies validation of digital signatures and enables certificate revocation within legacy systems. It also provides immediate revocation of all security capabilities. This paper discusses both the architecture and implementation of our approach as well as performance and compatibility with the existing infrastructure. Our results show that threshold cryptography is practical for certificate revocation.
引用
收藏
页码:297 / 308
页数:12
相关论文
共 50 条
  • [1] A method for fast revocation of certificateless public key cryptography
    Ibrahim, Ibrahim I.
    Ibrahim, Maged H.
    Allam, Ali M.
    2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 250 - +
  • [2] Revocation of privacy-enhanced public-key certificates
    Zhang, N
    Shi, Q
    Merabti, M
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 75 (1-2) : 205 - 214
  • [3] Efficient revocation of security capability in certificateless public key cryptography
    Ju, HS
    Kim, DY
    Lee, DH
    Lim, J
    Chun, K
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 453 - 459
  • [4] Fast digital certificate revocation - An alternative to short lived certificates
    Goyal, V
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 489 - 500
  • [5] Research on public key certificates
    Cheng, Changliang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 587 - 588
  • [6] Revocation-free public-key encryption based on security-mediated public-key infrastructure
    Lo, C. -M.
    Hwang, T.
    Li, C. -M.
    IET INFORMATION SECURITY, 2007, 1 (03) : 134 - 141
  • [7] Classifying public key certificates
    Lopez, J
    Oppliger, R
    Pernul, G
    PUBLIC KEY INFRASTRUCTURE, 2005, 3545 : 135 - 143
  • [8] Anonymous public key certificates and their applications
    Oishi, K
    Mambo, M
    Okamoto, E
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1998, E81A (01): : 56 - 64
  • [9] Security for IoT An effective DTLS with public certificates
    Panwar, Mukul
    Kumar, Ajay
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 163 - 166
  • [10] Non-Invertible Public Key Certificates
    Adrian Lizama-Perez, Luis
    Mauricio Lopez, J. R.
    ENTROPY, 2021, 23 (02) : 1 - 13