Efficient offline certificate revocation

被引:0
|
作者
Muñoz, JL
Forné, J
Esparza, O
Soriano, M
机构
来源
INTERACTIVE MULTIMEDIA ON NEXT GENERATION NETWORKS | 2003年 / 2899卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity Certificates (ICs) are widely used as underlying technology for securing many protocols and applications in the Internet. A Public Key Infrastructure (PKI) is required to securely deliver these certificates to widely-distributed users or systems. An identity certificate contains credentials and statements and as an document of this kind its contents are only guaranteed for a limited amount of time. The validity period of an IC might be quite long (up to several years). However, there are circumstances under which the validity of a certificate must be terminated sooner than assigned and thus, the certificate needs to be revoked. The revocation of certificates implies one of the major scalability problems in the whole PKI. Revocation can be achieved using either an online scheme or an offline scheme. In this paper we introduce the basics of these two schemes and we dicuss their advantages and drawbacks. We show also that offline systems provide the best level of security protection. Finally, we present an efficient offline system with bandwidth requirements similar to typical online systems.
引用
收藏
页码:319 / 330
页数:12
相关论文
共 50 条
  • [31] A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Hernandez-Serrano, Juan
    Esparza, Oscar
    Alins, Juanjo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1673 - 1686
  • [32] Efficient certificate revocation system implementation:: Huffman merkle hash tree (HuffMHT)
    Muñoz, JL
    Forné, J
    Esparza, O
    Rey, M
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 119 - 127
  • [33] On the Certificate Revocation Problem in the Maritime Sector
    Bour, Guillaume
    Bernsmed, Karin
    Borgaonkar, Ravishankar
    Meland, Per Hakon
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 142 - 157
  • [34] Empirical analysis of certificate revocation lists
    Walleck, Daryl
    Li, Yingjiu
    Xu, Shouhuai
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 159 - +
  • [35] Certificate revocation using fine grained certificate space partitioning
    Goyal, Vipul
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 247 - 259
  • [36] A Certificate Revocation Scheme for space network
    Qian, Yanbin
    Cao, Binghua
    Chen, Xingyuan
    Du, Xuehui
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4458 - 4462
  • [37] A novel approach to certificate revocation management
    Mukkamala, R
    Jajodia, S
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 225 - 238
  • [38] Certificate Revocation in MANET Using clustering
    Jose, Jissmol
    Sasi, Swapna B.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [39] Leveraging Locality of Reference for Certificate Revocation
    Dickinson, Luke
    Smith, Trevor
    Seamons, Kent
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 514 - 528
  • [40] Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs
    Khodaei, Mohammad
    Papadimitratos, Panos
    WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 172 - 183