Certiicate Revocation and Certiicate Update

نویسندگان

  • Moni Naor
  • Kobbi Nissim
چکیده

A new solution is suggested for the problem of certi cate revocation. This solution represents Certi cate Revocation Lists by an authenticated search data structure. The process of verifying whether a certi cate is in the list or not, as well as updating the list, is made very e cient. The suggested solution gains in scalability, communication costs, robustness to parameter changes and update rate. Comparisons to the following solutions are included: `traditional' CRLs (Certi cate Revocation Lists), Micali's Certi cate Revocation System (CRS) and Kocher's Certi cate Revocation Trees (CRT). Finally, a scenario in which certi cates are not revoked, but frequently issued for short-term periods is considered. Based on the authenticated search data structure scheme, a certi cate update scheme is presented in which all certi cates are updated by a common message. The suggested solutions for certi cate revocation and certi cate update problems is better than current solutions with respect to communication costs, update rate, and robustness to changes in parameters and is compatible e.g. with X.500 certi cates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eecient Certiicate Revocation

We apply o -line/on-line signatures to provide an alternative solution to the problem of certi cate revocation. The new systems dismiss with traditional CRLs (Certi cate Revocation Lists) and yield public-key infrastructures that are substantially cheaper to run than traditional ones.

متن کامل

Secret-key Certificates (continued) Secret-key Certiicates (continued)

A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...

متن کامل

Generalized Certiicate Revocation

We introduce a language for creating and manipulating cer-tiicates, that is, digitally signed data based on public key cryptography, and a system for revoking certiicates. Our approach provides a uniform mechanism for secure distribution of pubic key bindings, authorizations, and revocation information. An external language for the description of these and other forms of data is compiled into a...

متن کامل

Certificate Distribution with Local Autonomy

Any security architecture for a wide area network system spanning multiple administrative domains will require support for policy delegation and certiicate distribution across the network. Practical solutions will support local autonomy requirements of participating domains by allowing local policies to vary but imposing restrictions to ensure overall coherence of the system. This paper describ...

متن کامل

Protocols for Issuing Public - Key Certi catesover the

Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998