Using public-key infrastructures for security and risk management

被引:3
|
作者
Wing, P
O'Higgins, B
机构
[1] Scotiabank
关键词
Data privacy - Data structures - Risk management - Security of data;
D O I
10.1109/35.790867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Companies around the world are embracing electronic commerce, and within two years this long-heralded yet largely unrealized "killer application" for the Internet is poised for explosive 300 percent growth, according to Deloitte Consulting's 1998 Global Survey of Chief Information Executives. Security is an essential ingredient in enabling these electronic transactions. The fundamental requirements are to identify and authenticate the parties involved, and to protect the information from compromise. This article will describe the elements of public-key infrastructures, and show how they are well suited to provide these security services. The pioneering experience of Scotiabank, an early adopter of PKI technology and operator of one of the largest deployed PKIs on the Internet, is outlined.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [41] Cryptographically sound security proofs for basic and public-key Kerberos
    Michael Backes
    Iliano Cervesato
    Aaron D. Jaggard
    Andre Scedrov
    Joe-Kai Tsay
    International Journal of Information Security, 2011, 10
  • [42] On the security of biquadratic C public-key cryptosystems and its generalizations
    Felke, Patrick
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (03): : 427 - 442
  • [43] More on security of public-key cryptosystems based on Chebyshev polynomials
    Cheong, Kai Y.
    Koshiba, Takeshi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (09) : 795 - 799
  • [44] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 53 - 68
  • [45] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, Michael
    Cervesato, Iliano
    Jaggard, Aaron D.
    Scedrov, Andre
    Tsay, Joe-Kai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 107 - 134
  • [46] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [47] Recent progress in the security evaluation of multivariate public-key cryptography
    Ikematsu, Yasuhiko
    Nakamura, Shuhei
    Takagi, Tsuyoshi
    IET INFORMATION SECURITY, 2023, 17 (02) : 210 - 226
  • [48] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, M.
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 362 - 383
  • [49] Lattice-based public-key cryptosystems and security analysis
    Huang, Qiong
    Zhao, Yiming
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (10): : 60 - 62
  • [50] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200