Certiicate Revocation and Certiicate Update
نویسندگان
چکیده
A new solution is suggested for the problem of certi cate revocation. This solution represents Certi cate Revocation Lists by an authenticated search data structure. The process of verifying whether a certi cate is in the list or not, as well as updating the list, is made very e cient. The suggested solution gains in scalability, communication costs, robustness to parameter changes and update rate. Comparisons to the following solutions are included: `traditional' CRLs (Certi cate Revocation Lists), Micali's Certi cate Revocation System (CRS) and Kocher's Certi cate Revocation Trees (CRT). Finally, a scenario in which certi cates are not revoked, but frequently issued for short-term periods is considered. Based on the authenticated search data structure scheme, a certi cate update scheme is presented in which all certi cates are updated by a common message. The suggested solutions for certi cate revocation and certi cate update problems is better than current solutions with respect to communication costs, update rate, and robustness to changes in parameters and is compatible e.g. with X.500 certi cates.
منابع مشابه
Eecient Certiicate Revocation
We apply o -line/on-line signatures to provide an alternative solution to the problem of certi cate revocation. The new systems dismiss with traditional CRLs (Certi cate Revocation Lists) and yield public-key infrastructures that are substantially cheaper to run than traditional ones.
متن کاملSecret-key Certificates (continued) Secret-key Certiicates (continued)
A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...
متن کاملGeneralized Certiicate Revocation
We introduce a language for creating and manipulating cer-tiicates, that is, digitally signed data based on public key cryptography, and a system for revoking certiicates. Our approach provides a uniform mechanism for secure distribution of pubic key bindings, authorizations, and revocation information. An external language for the description of these and other forms of data is compiled into a...
متن کاملCertificate Distribution with Local Autonomy
Any security architecture for a wide area network system spanning multiple administrative domains will require support for policy delegation and certiicate distribution across the network. Practical solutions will support local autonomy requirements of participating domains by allowing local policies to vary but imposing restrictions to ensure overall coherence of the system. This paper describ...
متن کاملProtocols for Issuing Public - Key Certi catesover the
Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998