Skip to main content

Lightweight Certificates – Towards a Practical Model for PKI

  • Conference paper
Business Information Systems (BIS 2012)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 117))

Included in the following conference series:

Abstract

We present a concept for Public Key Infrastructure based on certificates that are not understood as a guarantee of Certification Authority for unconditional authenticity of the data contained in the certificate. As liability of CA is a source of cost barrier for widespread use of PKI services, we concentrate on cost-efficient solutions. At the same time we formulate requirements that fill the security gaps of the traditional PKI. We present exemplary technical solutions that witness feasibility of these requirements.

This research has been partially supported by Foundation for Polish Science, Programme MISTRZ.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Initiative: Pki 2.0 (2011), http://pki20.eu

  2. Schnorr, C.: Method for identyfying subscribers and for generating and veryfing electronic signatures in a data exchange system. U.S. Patent 4,995,082 (1991)

    Google Scholar 

  3. Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: The pace protocol for machine readable travel documents, and its security. In: Financial Cryptography 2012. LNCS. Springer (to appear, 2012)

    Google Scholar 

  4. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)

    Google Scholar 

  5. Nicolosi, A., Krohn, M.N., Dodis, Y., Mazières, D.: Proactive two-party signatures for user authentication. In: NDSS. The Internet Society (2003)

    Google Scholar 

  6. Błaśkiewicz, P., Kubiak, P., Kutyłowski, M.: Two-Head Dragon Protocol: Preventing Cloning of Signature Keys. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 173–188. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Choi, C.J., Kim, Z., Kim, K.: Schnorr signature scheme with restricted signing capability and its application. In: Computer Security Symposium (CSS), Kitakyushu, Japan, IPSJ, pp. 385–390 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krzywiecki, Ł., Kubiak, P., Kutyłowski, M., Tabor, M., Wachnik, D. (2012). Lightweight Certificates – Towards a Practical Model for PKI. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds) Business Information Systems. BIS 2012. Lecture Notes in Business Information Processing, vol 117. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30359-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30359-3_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30358-6

  • Online ISBN: 978-3-642-30359-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics