Back to Search
Start Over
How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities
- Source :
- Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, 53-68, STARTPAGE=53;ENDPAGE=68;TITLE=Public Key Infrastructures, Services and Applications
- Publication Year :
- 2013
- Publisher :
- Springer, 2013.
-
Abstract
- Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructures (PKIs) and the fatal impact of revoked Certification Authority (CA) certificates in the PKIX validity model. Alternative validity models, such as the extended shell and the chain model, improve the situation but rely on independent proofs of existence, which are usually provided using time-stamps. As time-stamps are validated using certificates, they suffer from the same problems as the PKI they are supposed to protect. Our solution to this problem is abandoning time-stamps and providing proof of existence using Forward Secure Signatures (FSS). In particular, we present different possibilities to use the chain model together with FSS, resulting in schemes that include the necessary proofs of existence into the certificates themselves.
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, 53-68, STARTPAGE=53;ENDPAGE=68;TITLE=Public Key Infrastructures, Services and Applications
- Accession number :
- edsair.narcis........6d976f72d4804cfb32a70dd83b2feaaa