Revocation of privacy-enhanced public-key certificates

被引:0
|
作者
Zhang, N
Shi, Q
Merabti, M
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
[2] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
基金
英国工程与自然科学研究理事会;
关键词
public-key certificate; privacy; anonymity; e-commerce; communication protocol;
D O I
10.1016/j.jss.2004.04.013
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a novel protocol for the revocation of privacy-enhanced/anonymous public-key certificates in relation to a protocol for anonymous public-key certificate issuing published previously. Not only can this certificate revocation protocol revoke an anonymous public-key certificate upon a request from its holder, but also automatically revoke any certificate issued directly or indirectly based on the certificate revoked, in an anonymous and accountable manner. In case the private key associated with an anonymous public-key certificate is suspected of having been compromised, the certificate holder can operate the protocol to easily revoke the compromised certificate together with its related ones so as to stop them being abused. The protocol is also assessed with regard to requirements such as accountability and anonymity. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 50 条
  • [1] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [2] A model for revocation forecasting in public-key infrastructures
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Esparza, Oscar
    Alins, Juanjo
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (02) : 311 - 331
  • [3] Towards a better applicability of public-key certificates
    Hamdy, Safuat
    2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 119 - 123
  • [4] Applications in health care using public-key certificates and attribute certificates
    Wohlmacher, P
    Pharow, P
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 128 - 137
  • [5] Investigating Public-Key Certificate Revocation in Smart Grid
    Mahmoud, Mohamed M. E. A.
    Misic, Jelena
    Akkaya, Kemal
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (06): : 490 - 503
  • [6] Revocation-free public-key encryption based on security-mediated public-key infrastructure
    Lo, C. -M.
    Hwang, T.
    Li, C. -M.
    IET INFORMATION SECURITY, 2007, 1 (03) : 134 - 141
  • [7] PRIVACY, FREEDOM AND PUBLIC-KEY CRYPTOGRAPHY
    RICE, R
    INFORMATION AGE, 1986, 8 (04): : 208 - 214
  • [8] Prepaid electronic cheques using public-key certificates
    Radu, C
    Govaerts, R
    Vandewalle, J
    CRYPTOGRAPHY AND CODING: 5TH IMA CONFERENCE, 1995, 1025 : 132 - 141
  • [9] Efficient handling of certificates within public-key infrastructures
    Faldella, E.
    Prandini, M.
    Computers and Computational Engineering in Control, 1999, : 289 - 296
  • [10] A method for fast revocation of public key certificates and security capabilities
    Boneh, D
    Ding, XH
    Tsudik, G
    Wong, CM
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 297 - 308