Applying speaker verification to certificate revocation
نویسندگان
چکیده
The increasing popularity and importance of electronic commerce is evident today. However, global electronic commerce will not fully develop its immense potential unless trust is fully established. Digital certificates and electronic signature contribute to increase confidence and security by providing authenticity. However, authenticity on its own is not enough to provide trust. A credible service needs to provide authenticity and validity at the same time. In this sense, traditional Public Key Infrastructure (PKI) services have revealed a weak point due to inherent delays existing in order to cancel the possible use of a certificate when it has been lost or stolen. The CertiVeR Project intends to solve this problem and to strengthen security in commercial transactions. CertiVeR has adopted speaker verification (SV) to validate the users’ identities. The performance of the SV system has been evaluated with a Spanish database that gathers fixedline and mobile telephone sessions.
منابع مشابه
Domain Based Certification and Revocation
Certificate Authorities (CAs) are considered as a single point of failure in the design of Public Key Infrastructure (PKI). Adversaries can take the advantage of a compromised CA to issue certificates for any domains without being noticed by the domain owners. Another argument regarding PKI is the adoption of Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) for pu...
متن کاملSecuring Certificate Revocation through Speaker Verification: the CertiVeR Project
The increasing popularity and importance of electronic commerce is evident today. However, global electronic commerce will not fully develop its immense potential unless trust is fully established. Digital certificates and electronic signature contribute to increase confidence and security by providing authenticity. However, authenticity on its own is not enough to provide trust. A credible ser...
متن کاملAn Efficient Certificate Revocation and Verification Scheme from Multi-Hashing
Even though Public Key Infrastructure (PKI) and X.509 certificate has been a prominent security model for a variety of e-commerce applications and large scale distributed computing, it has not been sufficiently investigated in the certificate revocation and verification mechanism. In this paper, we discuss the need and importance of certificate revocation and verification, and analyze the limit...
متن کاملAsynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for implementation of large-scale certification authorities (CAs). In most aspects, the CVT approach outperforms previous approaches like X.509 and certificate revocation lists, SDSI/SPKI, certificate revocation trees, etc....
متن کاملIntrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks
Vehicular Ad-hoc network uses some advanced Public Key Infrastructure and digital signature method for security. But, intrusion detection and avoidance is an inevitable challenge in networks. Authentication is performed in any PKI (Public Key Infrastructure) system by checking if the certificate of the sender is included in the CRL (Certificate Revocation List) and verifying the authenticity an...
متن کامل