Abstract
We present a concept for Public Key Infrastructure based on certificates that are not understood as a guarantee of Certification Authority for unconditional authenticity of the data contained in the certificate. As liability of CA is a source of cost barrier for widespread use of PKI services, we concentrate on cost-efficient solutions. At the same time we formulate requirements that fill the security gaps of the traditional PKI. We present exemplary technical solutions that witness feasibility of these requirements.
This research has been partially supported by Foundation for Polish Science, Programme MISTRZ.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Initiative: Pki 2.0 (2011), http://pki20.eu
Schnorr, C.: Method for identyfying subscribers and for generating and veryfing electronic signatures in a data exchange system. U.S. Patent 4,995,082 (1991)
Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: The pace protocol for machine readable travel documents, and its security. In: Financial Cryptography 2012. LNCS. Springer (to appear, 2012)
Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)
Nicolosi, A., Krohn, M.N., Dodis, Y., Mazières, D.: Proactive two-party signatures for user authentication. In: NDSS. The Internet Society (2003)
Błaśkiewicz, P., Kubiak, P., Kutyłowski, M.: Two-Head Dragon Protocol: Preventing Cloning of Signature Keys. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 173–188. Springer, Heidelberg (2011)
Choi, C.J., Kim, Z., Kim, K.: Schnorr signature scheme with restricted signing capability and its application. In: Computer Security Symposium (CSS), Kitakyushu, Japan, IPSJ, pp. 385–390 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Krzywiecki, Ł., Kubiak, P., Kutyłowski, M., Tabor, M., Wachnik, D. (2012). Lightweight Certificates – Towards a Practical Model for PKI. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds) Business Information Systems. BIS 2012. Lecture Notes in Business Information Processing, vol 117. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30359-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-30359-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30358-6
Online ISBN: 978-3-642-30359-3
eBook Packages: Computer ScienceComputer Science (R0)