A new public key certificate revocation scheme based on one-way hash chain

被引:0
|
作者
Li, JF [1 ]
Zhu, YF
Pan, H
Wei, DW
机构
[1] Zhengzhou Univ, Inst Informat Engn, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ, Inst Electron Technol, Zhengzhou 450004, Peoples R China
来源
ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS | 2005年 / 3739卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Public Key Certificate (PKC) is an important way to support the secure global WEB applications. The revocation of the PKC, however, remains as one of the most costly problems in the certificate management. In this paper, a new public key certificate revocation scheme based on one-way hash chain is proposed. Specifically, no centralized authority holds responsibility to collect and publish certificate status information. Instead, the individual user takes charge of his own certificate status by periodically releasing an updated secure hash value. The paper concludes with an informal examination of the security, efficiency and scalability of this scheme.
引用
收藏
页码:670 / 675
页数:6
相关论文
共 50 条
  • [21] A new strong-password authentication scheme using one-way hash functions
    C. -W. Lin
    C. -S. Tsai
    M. -S. Hwang
    Journal of Computer and Systems Sciences International, 2006, 45 : 623 - 626
  • [22] One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
    Wang, Qiuhua
    Chen, Huifang
    Xie, Lei
    Wang, Kuang
    AD HOC NETWORKS, 2013, 11 (08) : 2500 - 2511
  • [23] A Fast New One-Way Cryptographic Hash Function
    Liu Jian-dong
    Tian Ye
    Wang Shu-hong
    Yang Kai
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 302 - 306
  • [24] AN optimized LKH scheme based on one-way hash function for secure group communications
    Kang Qiao-Yan
    Meng Xiang-Ru
    Wang Jian-Feng
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1107 - +
  • [25] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [26] Signature scheme based on discrete logarithm without using one-way hash function
    Shao, ZH
    ELECTRONICS LETTERS, 1998, 34 (11) : 1079 - 1080
  • [27] An improved signature scheme without using one-way Hash functions
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 905 - 908
  • [28] A watermarking technique based on one-way hash functions
    Hwang, MS
    Chang, CC
    Hwang, KF
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (02) : 286 - 294
  • [29] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [30] Multicast rekeying protocol based on one-way key chain tree
    Zhu, Lie-Huang
    Cao, Yuan-Da
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2004, 24 (07): : 609 - 612