A novel approach to on-line status authentication of public-key certificates

被引:3
|
作者
Faldella, E [1 ]
Prandini, M [1 ]
机构
[1] Univ Bologna, Dept Elect Comp Sci & Syst, Bologna, Italy
关键词
D O I
10.1109/ACSAC.2000.898881
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security constraints. The approach relying on public-key certificates certainly represents a valuable solution from the viewpoint of data integrity and authentication The effectiveness of the approach, however, may be arguable, especially when a trivial strategy is adopted within a Public-Key Infrastructure (PKI) to deal with the problem of revoked certificates. This paper presents a novel certificate status handling scheme, based on a purposely-conceived extension of the One-Way Accumulator (OWA) cryptographic primitive. The distinguishing characteristic of the devised Owa-based Revocation Scheme (ORS) is that it exploits a single directory-signed proof to collectively authenticate the status of all the certificates handled by a Certification Authority (CA) within a PKI. A thorough investigation on the performance attainable shows that ORS exhibits the same features of the well-known On-line Certificate Status Protocol (OCSP) as regards security, scalability and certificate status-updating timeliness, at the same time drastically reducing the directory computational load that, in a high-traffic context, could be nearly unbearable when OCSP is applied.
引用
收藏
页码:270 / 277
页数:8
相关论文
共 50 条
  • [1] A flexible scheme for on-line public-key certificate status updating and verification
    Faldella, E
    Prandini, M
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 891 - 898
  • [2] Towards a better applicability of public-key certificates
    Hamdy, Safuat
    2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 119 - 123
  • [3] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [4] Parallel authentication and public-key encryption
    Pieprzyk, J
    Pointcheval, D
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 387 - 401
  • [5] Applications in health care using public-key certificates and attribute certificates
    Wohlmacher, P
    Pharow, P
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 128 - 137
  • [6] Prepaid electronic cheques using public-key certificates
    Radu, C
    Govaerts, R
    Vandewalle, J
    CRYPTOGRAPHY AND CODING: 5TH IMA CONFERENCE, 1995, 1025 : 132 - 141
  • [7] Efficient handling of certificates within public-key infrastructures
    Faldella, E.
    Prandini, M.
    Computers and Computational Engineering in Control, 1999, : 289 - 296
  • [8] Revocation of privacy-enhanced public-key certificates
    Zhang, N
    Shi, Q
    Merabti, M
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 75 (1-2) : 205 - 214
  • [9] Public-key encryption and authentication of quantum information
    Liang Min
    Yang Li
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2012, 55 (09) : 1618 - 1629
  • [10] A Secure Public-key Image Authentication Plan
    YANG Qing
    Wuhan University Journal of Natural Sciences, 2005, (01) : 289 - 292