Muñoz-Tapia et al., 2002 - Google Patents
CPC-OCSP: an adaptation of OCSP for m-CommerceMuñoz-Tapia et al., 2002
View PDF- Document ID
- 10438339156030507460
- Author
- Muñoz-Tapia J
- Forné-Muñoz J
- Publication year
- Publication venue
- EUropean Certification of Informatics Professionals
External Links
Snippet
Public key cryptography is widely used to provide security services. An entire infrastructure is needed to support public key cryptography and certificate revocation is one of its major costs. In this paper we briefly review the different types of revocation systems and we …
- 102100005289 TSPAN10 0 title abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Naor et al. | Certificate revocation and certificate update | |
| Maurer | Modelling a public-key infrastructure | |
| Gassko et al. | Efficient and fresh certification | |
| US7284121B2 (en) | System and method for transmitting reduced information from a certificate to perform encryption operations | |
| CN110601816B (en) | Lightweight node control method and device in block chain system | |
| Stubblebine | Recent-secure authentication: Enforcing revocation in distributed systems | |
| US20090055916A1 (en) | Secure delegation using public key authentication | |
| US20080133907A1 (en) | Propagation of certificate revocation information | |
| US20060048210A1 (en) | System and method for policy enforcement in structured electronic messages | |
| US20110167258A1 (en) | Efficient Secure Cloud-Based Processing of Certificate Status Information | |
| Ozcelik et al. | Cryptorevocate: A cryptographic accumulator based distributed certificate revocation list | |
| Hormann et al. | Evaluation of certificate validation mechanisms | |
| Munoz et al. | Certificate revocation system implementation based on the Merkle hash tree | |
| Ansper et al. | Efficient long-term validation of digital signatures | |
| Zhao et al. | Evaluating the performance impact of PKI on BGP security | |
| Muñoz et al. | Evaluation of certificate revocation policies: OCSP vs. Overissued-CRL | |
| Muñoz-Tapia et al. | CPC-OCSP: an adaptation of OCSP for m-Commerce | |
| Jøsang et al. | PKI seeks a trusting relationship | |
| Prakasha et al. | Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list | |
| Munoz et al. | Using OCSP to secure certificate-using transactions in M-commerce | |
| Pulls | Privacy-Friendly cloud storage for the data track: an educational transparency tool | |
| Yao et al. | Cd-BCM: Cross-domain batch certificates management based on blockchain | |
| Muñoz et al. | Certificate revocation policies for wireless communications | |
| Kumar et al. | Security enforcement using PKI in Semantic Web | |
| Russell et al. | Virtual certificates and synthetic certificates: new paradigms for improving public key validation |