Privacy-preserving revocation checking

被引:0
|
作者
M. Narasimha
J. Solis
G. Tsudik
机构
[1] University of California,Computer Science Department
关键词
Privacy-preserving revocation checking; Anonymity and privacy; Revocation; Certificate revocation lists; Certificate revocation trees;
D O I
暂无
中图分类号
学科分类号
摘要
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert the validity of another party’s certificate, it performs a certificate revocation check. There are several revocation techniques varying in both the operational model and underlying data structures. One common feature is that a client typically contacts some third party (whether trusted, untrusted or semi-trusted) and obtains some evidence of either revocation or validity (non-revocation) for the certificate in question. While useful, revocation checking can leak sensitive information. In particular, third parties of dubious trustworthiness can discover the identity of the party performing the revocation check, as well as the target of the check. The former can be easily remedied with techniques such as onion routing or anonymous web browsing. Whereas, hiding the target of the query is not obvious. This paper focuses on the privacy in revocation checking, explores the loss of privacy in current revocation checking techniques and proposes simple and efficient privacy-preserving techniques for two well-known revocation methods.
引用
收藏
页码:61 / 75
页数:14
相关论文
共 50 条
  • [1] Privacy-preserving revocation checking
    Narasimha, M.
    Solis, J.
    Tsudik, G.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 61 - 75
  • [2] Privacy-preserving revocation checking with modified CRLs
    Narasimha, Maithili
    Tsudik, Gene
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 18 - +
  • [3] Privacy-Preserving Plagiarism Checking
    Bhimrajka, Nidhish
    Chakrabarti, Sujit
    Choudhury, Ashish
    Varadarajan, Supreeth
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 105 - 125
  • [4] Privacy-Preserving Subgraph Checking
    Wueller, Stefan
    Assadsolimani, Benjamin
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 111 - 116
  • [5] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    [J]. IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [6] Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs
    Hoelzl, Michael
    Roland, Michael
    Mir, Omid
    Mayrhofer, Rene
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1601 - 1609
  • [7] A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation
    Sun, Jinyuan
    Zhu, Xiaoyan
    Fang, Yuguang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [8] Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random Functions
    Papathanasiou, Athanasia Maria
    Polyzos, George C.
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 391 - 394
  • [9] Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities
    Simplicio, Marcos A.
    Cominetti, Eduardo Lopes
    Patil, Harsh Kupwade
    Ricardini, Jefferson E.
    Ferraz, Leonardo T. D.
    Silva, Marcos Vinicius M.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (06) : 3326 - 3336
  • [10] Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
    Li, Rujia
    Galindo, David
    Wang, Qi
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 355 - 371