Conventional Public Key Infrastructure: An Artefact Ill-Fitted to the Needs of the Information Society
نویسنده
چکیده
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature technology, based on public key cryptography, has been claimed as the appropriate means of achieving this aim. Digital signatures do little, however, unless a substantial ’public key infrastructure’ (PKI) is in place to provide a basis for believing that the signature means something of significance to the relying party. Conventional PKI, built around ISO standard X.509, has been, and will continue to be, a substantial failure. This paper examines that form of PKI architecture, and concludes that the reason for its failure is its very poor fit to the real needs of cyberspace participants. Its key deficiencies are its inherently hierarchical and authoritarian nature, its unreasonable presumptions about the security of private keys, a range of other technical and implementation defects, confusions about what it is that a certificate actually provides assurance about, and its inherent privacy-invasiveness. Alternatives to conventional PKI are identified.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملبررسی نیازهای اطلاعاتی بهداشتی و اطلاعیابی سلامت در میان کاربران کتابخانههای عمومی استان مازندران در سال 1395: یک گزارش کوتاه
Background and Objectives: Health information plays an important role related to increasing people’s health level in today's societies and can provide appropriate condition for developing health policy and system of different countries. This study aimed to determine the health information needs and health information seeking ways among the users of Mazandaran public libraries. Materials ...
متن کاملInformation Needs of Nomadic Women of Kohkilouyeh City
Background and Aim: The present study was conducted to determine health, educational, religious, economic and cultural information needs of nomadic women in Kohkilouyeh city and identifying the way they use resources, their barriers and problems in accessing information, their information priorities. Methods: This is applied survey conducted using a researcher-made questionnaire and oral inte...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کامل