A novel approach to on-line status authentication of public-key certificates

被引:3
|
作者
Faldella, E [1 ]
Prandini, M [1 ]
机构
[1] Univ Bologna, Dept Elect Comp Sci & Syst, Bologna, Italy
关键词
D O I
10.1109/ACSAC.2000.898881
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security constraints. The approach relying on public-key certificates certainly represents a valuable solution from the viewpoint of data integrity and authentication The effectiveness of the approach, however, may be arguable, especially when a trivial strategy is adopted within a Public-Key Infrastructure (PKI) to deal with the problem of revoked certificates. This paper presents a novel certificate status handling scheme, based on a purposely-conceived extension of the One-Way Accumulator (OWA) cryptographic primitive. The distinguishing characteristic of the devised Owa-based Revocation Scheme (ORS) is that it exploits a single directory-signed proof to collectively authenticate the status of all the certificates handled by a Certification Authority (CA) within a PKI. A thorough investigation on the performance attainable shows that ORS exhibits the same features of the well-known On-line Certificate Status Protocol (OCSP) as regards security, scalability and certificate status-updating timeliness, at the same time drastically reducing the directory computational load that, in a high-traffic context, could be nearly unbearable when OCSP is applied.
引用
收藏
页码:270 / 277
页数:8
相关论文
共 50 条
  • [21] A public-key based watermarking for color image authentication
    Byun, SC
    Lee, IL
    Shin, TH
    Ahn, BH
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 593 - 596
  • [22] PASSWORD AUTHENTICATION BASED ON PUBLIC-KEY DISTRIBUTION CRYPTOSYSTEM
    HARN, L
    HUANG, D
    LAIH, CS
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 332 - 338
  • [23] Toward secure public-key blockwise fragile authentication watermarking
    Barreto, PSLM
    Kim, HY
    Rijmen, V
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02): : 57 - 62
  • [24] Research to formal analysis methods for public-key authentication protocols
    Qian, Yong
    Gu, Da-Wu
    Chen, Ke-Fei
    Bai, Ying-Cai
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (02):
  • [25] Toward a secure public-key blockwise fragile authentication watermarking
    Barreto, PSLM
    Kim, HY
    Rijmen, V
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2001, : 494 - 497
  • [26] AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL
    LOWE, G
    INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 131 - 133
  • [27] A denial-of-service resistant public-key authentication and key establishment protocol
    Fung, CK
    Lee, MC
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
  • [28] SINGLE PUBLIC-KEY AUTHENTICATION SCHEME FOR MULTIPLE USERS.
    Okamoto, Tatsuaki
    Systems and Computers in Japan, 1987, 18 (10) : 14 - 24
  • [29] A public-key based authentication and key establishment protocol coupled with a client puzzle
    Lee, MC
    Fung, CK
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823
  • [30] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57