A new public key certificate revocation scheme based on one-way hash chain

被引:0
|
作者
Li, JF [1 ]
Zhu, YF
Pan, H
Wei, DW
机构
[1] Zhengzhou Univ, Inst Informat Engn, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ, Inst Electron Technol, Zhengzhou 450004, Peoples R China
来源
ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS | 2005年 / 3739卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Public Key Certificate (PKC) is an important way to support the secure global WEB applications. The revocation of the PKC, however, remains as one of the most costly problems in the certificate management. In this paper, a new public key certificate revocation scheme based on one-way hash chain is proposed. Specifically, no centralized authority holds responsibility to collect and publish certificate status information. Instead, the individual user takes charge of his own certificate status by periodically releasing an updated secure hash value. The paper concludes with an informal examination of the security, efficiency and scalability of this scheme.
引用
收藏
页码:670 / 675
页数:6
相关论文
共 50 条
  • [31] Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
    Schoenmakers, Berry
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 299 - 320
  • [32] One-way property proof in public key cryptography based on OHNN
    Li Guo-Gang
    Guo Dong-Hui
    CEIS 2011, 2011, 15
  • [33] A SADIC(Sybil Attack Detection with an ID-based Certificate) design using One-way Key-chain on WSNs
    Jeong, EunHee
    Lee, ByungKwan
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4933 - 4938
  • [34] The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain
    Iuon-Chang Lin
    Min-Shiang Hwang
    Chin-Chen Chang
    Designs, Codes and Cryptography, 2005, 36 : 53 - 67
  • [35] The general pay-word:: A micro-payment scheme based on n-dimension one-way hash chain
    Lin, IC
    Hwang, MS
    Chang, CC
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 36 (01) : 53 - 67
  • [36] Signature scheme based on discrete logarithm without using one-way hash-function
    Yeun, CY
    Mitchell, CJ
    Ng, SL
    ELECTRONICS LETTERS, 1998, 34 (24) : 2329 - 2330
  • [37] A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 197 - 201
  • [38] Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks
    Joon-Sang Park
    Seung Jun Beak
    Peer-to-Peer Networking and Applications, 2014, 7 : 737 - 742
  • [39] Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks
    Park, Joon-Sang
    Beak, Seung Jun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 737 - 742
  • [40] Novel lightweight CIP handoff authenticated protocol based on one-way hash chain trees
    2005, Shanghai Computer Society, Shanghai, China (31):