An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
نویسندگان
چکیده
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastructures (PKIs). Such a PKI, which is called Nested certificate based PKI (NPKI), is proposed in this paper as alternative to classical PKI. The NPKI formation model is a transition from an existing PKI by issuing nested certificates. Thus, we can extract efficiently verifiable nested certificate paths instead of classical certificate paths. NPKI is a dynamic system and involves several authorities in order to add a new user to the system. This uses the authorities’ idle time to the benefit of the verifiers. In this paper, we analyze the trade-off between the nested certification overhead and the time improvement on the certificate path verification. This trade-off is acceptable in order to generate quickly verifiable certificate paths. Moreover, PKI-to-NPKI transition preserves the existing hierarchy and trust relationships in the PKI, so that it can be used for strictly
منابع مشابه
An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level
Certificateless public key cryptography with bilinear pairing needs costly operations, which is not appropriate for a practical application. In this paper, we present a certificateless public key encryption scheme without bilinear pairing. This encryption scheme achieves Girault’s trust Level 3 as in traditional public key infrastructure based cryptography, and which is proved to be secure in t...
متن کاملStudy on the Privacy-Preserving Vehicular PKI in Autonomous Driving Environments
Vehicle-to-Everything (V2X) communication for autonomous driving is currently a focus of research and standardization in the USA, Europe and Asia. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication has great potential to increase road and passenger safety, and has been considered a next important part of cooperative Intelligent Transportation Systems for the vision of ac...
متن کاملECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust points to the CA of the certificate. The latter part is referred to as certificate path validation. In this paper, we suggest an efficient certificate path validation scheme (ECPV) that employs delegation with efficient compu...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملThe Florida State University College of Arts and Sciences Trust Management in Mobile Wireless Networks: Security and Survivability
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the selfish node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic ad hoc nature, these networks are particularly vulne...
متن کامل