A novel approach to on-line status authentication of public-key certificates

被引:3
|
作者
Faldella, E [1 ]
Prandini, M [1 ]
机构
[1] Univ Bologna, Dept Elect Comp Sci & Syst, Bologna, Italy
关键词
D O I
10.1109/ACSAC.2000.898881
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security constraints. The approach relying on public-key certificates certainly represents a valuable solution from the viewpoint of data integrity and authentication The effectiveness of the approach, however, may be arguable, especially when a trivial strategy is adopted within a Public-Key Infrastructure (PKI) to deal with the problem of revoked certificates. This paper presents a novel certificate status handling scheme, based on a purposely-conceived extension of the One-Way Accumulator (OWA) cryptographic primitive. The distinguishing characteristic of the devised Owa-based Revocation Scheme (ORS) is that it exploits a single directory-signed proof to collectively authenticate the status of all the certificates handled by a Certification Authority (CA) within a PKI. A thorough investigation on the performance attainable shows that ORS exhibits the same features of the well-known On-line Certificate Status Protocol (OCSP) as regards security, scalability and certificate status-updating timeliness, at the same time drastically reducing the directory computational load that, in a high-traffic context, could be nearly unbearable when OCSP is applied.
引用
收藏
页码:270 / 277
页数:8
相关论文
共 50 条
  • [31] A group theoretic approach to public-key cryptography
    Anshel, I
    Anshel, M
    Fisher, B
    Goldfeld, D
    UNUSUAL APPLICATIONS OF NUMBER THEORY, 2004, 64 : 17 - 23
  • [32] An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1577 - 1582
  • [33] Anonymous Authentication from Public-Key Encryption Revisited (Extended Abstract)
    Slamanig, Daniel
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 247 - 249
  • [34] A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
    Saito, Takamichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1268 - 1279
  • [35] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [36] A Simple and Novel Quantum Money Public-key Cryptosystem
    Nie, A. R.
    INTERNATIONAL CONFERENCE ON ADVANCED EDUCATIONAL TECHNOLOGY AND INFORMATION ENGINEERING (AETIE 2015), 2015, : 1040 - 1047
  • [37] An efficient public-key based authentication with Mobile-IF in E-commerce
    Chung, S
    Chae, K
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2825 - 2831
  • [38] A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem
    Shoufan, Abdulhadi
    Wink, Thorsten
    Molter, H. Gregor
    Huss, Sorin A.
    Kohnert, Eike
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (11) : 1533 - 1546
  • [39] A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function
    Wang, Dahu
    Bai, Heyuan
    Liu, Qunpo
    Tong, Zhaojing
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 530 - 533
  • [40] ID-Authentication Based on PTPM and Certificateless Public-Key Cryptography in Cloud
    Xia, Hui
    Yang, Weiji
    International Journal of Network Security, 2021, 23 (06) : 952 - 961