A delayed commitment scheme to enhance public key certificate based protocols

被引:0
|
作者
Wen, W [1 ]
机构
[1] Sci Univ Tokyo, Noda, Chiba 2788510, Japan
关键词
D O I
10.1109/ENABL.2000.883725
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An "ex-employee" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS handshake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate[2]. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above "ex-employee" attack.
引用
收藏
页码:181 / 182
页数:2
相关论文
共 50 条
  • [31] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    [J]. 41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
  • [32] A Public Key Encryption Scheme Based on Compressed Sensing
    Zhen, Liu
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 20 - 24
  • [33] SecureGuard: A Certificate Validation System in Public Key Infrastructure
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Cheng, Xiuzhen
    Hu, Chunqiang
    Yu, Jiguo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5399 - 5408
  • [34] Changing of the Guards: Certificate and Public Key Management on the Internet
    Bruhner, Carl Magnus
    Linnarsson, Oscar
    Nemec, Matus
    Arlitt, Martin
    Carlsson, Niklas
    [J]. PASSIVE AND ACTIVE MEASUREMENT (PAM 2022), 2022, 13210 : 50 - 80
  • [35] Robustness principles for public key protocols
    Anderson, R
    Needham, R
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 236 - 247
  • [36] Secret Public Key Protocols Revisited
    Lim, Hoon Wei
    Paterson, Kenneth G.
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 237 - 256
  • [37] A certificate-based signature scheme
    Kang, BG
    Park, JH
    Hahn, SG
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 99 - 111
  • [38] AMI Authentication Method based on Hardware Public Key Certificate using Unique Identifier
    Choi, Pil Joo
    Kim, Hyun Il
    Kim, Dong Kyue
    [J]. 2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 341 - 342
  • [39] A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 754 - 765
  • [40] Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
    Shen, Pei-Yuan
    Tang, Maolin
    Liu, Vicky
    Caelli, William
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (01) : 33 - 56