The key authority - Secure key management in hierarchical public key infrastructures

被引:0
|
作者
Wiesmaier, A [1 ]
Lippert, M [1 ]
Karatsiolis, V [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
关键词
certification authority; hierarchical trust; key management; PKI; public key infrastructure; trust center;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key. Based on this we define and describe the key authority, a trust center module, which potentiates the easy enforcement of secure management of private keys in hierarchical public key infrastructures. This is done by assembling all trust center tasks concerning the crucial handling of private keys within one centralized module. As this module resides under full control of the trust center's carrier it can easily be protected by well-known organizational and technical measures.
引用
收藏
页码:89 / 93
页数:5
相关论文
共 50 条
  • [21] Perspectives on public-key-infrastructures -: developing the basis of secure electronic commerce
    Lamberti, HJ
    Költzsch, T
    WIRTSCHAFTSINFORMATIK, 2000, 42 (06): : 517 - +
  • [22] Secure key management in hierarchical group communication using agents
    Parvar, H.
    Moulavi, M. Amir
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 217 - 221
  • [23] Group and hierarchical key management for secure communications in internet of things
    Karrothu, Aravind
    Norman, Jasmine
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [24] A Secure Hierarchical Key Management Scheme in Wireless Sensor Network
    Zhang, Yiying
    Li, Xiangzhen
    Liu, Jianming
    Yang, Jucheng
    Cui, Baojiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [25] A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    Pour, Alireza Nemancy
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    COMPUTER NETWORKS, 2007, 51 (17) : 4727 - 4743
  • [26] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [27] Building hierarchical public key infrastructures in mobile ad-hoc networks
    Satizabal, Cristina
    Forne, Jordi
    Hernandez-Serrano, Juan
    Pegueroles, Josep
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 485 - +
  • [28] Secure and efficient group key management with shared key derivation
    Lin, Jen-Chiun
    Huang, Kuo-Hsuan
    Lai, Feipei
    Lee, Hung-Chang
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 192 - 208
  • [29] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Wu, Qi-wu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1859 - 1883
  • [30] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Qi-wu Wu
    Wireless Personal Communications, 2013, 70 : 1859 - 1883