skip to main content
10.1145/1456508.1456519acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Beacon certificate push revocation

Published:31 October 2008Publication History

ABSTRACT

Authentication information is best localized. Local sources of authentication information are better able to physically identify users, provide authoritative information on them, adequately protect authentication information and infrastructure, and ato provide high quality authentication at an affordable cost.

We consider here the problem of public key authentication using a potentially large number of local Certificate Authorities (CAs). The information provided by these CAs is federated together to create a large-scale distributed authentication base. One of the key problems in doing so is certificate revocation. Efficient mechanisms are described for certificate revocation when there are many CAs and we provide some measures on their efficiency.

References

  1. Y. Elley, A. Anderson, S. Hanna, S. Mullan, R. Perlman, and S. Proctor. Building certification paths: Forward vs. reverse. In Proc. of the Symp. on Network and Distributed Systems Security (NDSS), San Diego, CA, 2001. Internet Society.Google ScholarGoogle Scholar
  2. Armando Fox and Eric A. Brewer. Harvest, yield and scalable tolerant systems. In Workshop on Hot Topics in Operating Systems, pages 174--178, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Seth Gilbert and Nancy Lynch. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News, 33(2):51--59, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Vipul Goyal. Certificate revocation using fine grained certificate space patitioning. In Financial Cryptography and Data Security Conference, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  5. Peter Gutmann. PKI: It's not dead, just resting. IEEE Computer, 35(8):41--49, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Peter Gutmann. Drawing lessons. In 3rd PKI workshop, 2004. Invited talk.Google ScholarGoogle Scholar
  7. Paul C. Kocher. On certificate revocation and validation. In FC'98: Proceedings of the Second International Conference on Financial Cryptography, pages 172--177, London, UK, 1998. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Leslie Lamport. Password authentication with insecure communication. Commun. ACM, 24(11):770--772, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Merkle. A digital signature based on a conventional encryption function. In Crypto, pages 369--378, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Silvio Micali. Efficient certificate revocation. Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Silvio Micali. Efficient certificate revocation. In Proceedings 1197 RSA Data Security Conference, 1997.Google ScholarGoogle Scholar
  12. Silvio Micali. NOVOMODO: Scalable certificate validation and simplified PKI management. In 1st PKI Workshop, 2002.Google ScholarGoogle Scholar
  13. Online certificate status protocol, version 2. Working document of the Internet Engineering Task Force (IETF).Google ScholarGoogle Scholar
  14. D.D. Redell and R.S. Fabry. Selective revocation of capabilities. In Proceedings of the International Workshop on Protection in Operating Systems, pages 197--209, August 1974.Google ScholarGoogle Scholar
  15. Ronald Rivest, Adi Shamir, and L. Adleman. On digital signatures and public key cryptosystems. Communications of the ACM (CACM), 21:120--126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ronald L. Rivest. Can we eliminate certificate revocations lists? In Financial Cryptography, pages 178--183, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jon A. Solworth. Instant revocation. In EuroPKI'08, June 2008. available at http://www.rites.uic.edu/solworth/solworth08instantRevocation.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jennifer G. Steiner, B. Clifford Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Winter 1988 USENIX Conference, pages 191--201, Dallas, TX, 1988.Google ScholarGoogle Scholar
  19. Stuart Stubblebine. Recent-secure authentication: Enforcing revocation in distributed systems. In Proceedings 1995 IEEE Symposium on Research in Security and Privacy, pages 224--234, May 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Zhao and S.W. Smith. Modeling and evaluation of certification path discovery in the emerging global PKI. In Public Key Infrastructure: EuroPKI 2006. Springer-Verlag LNCS., 2006.Google ScholarGoogle Scholar

Index Terms

  1. Beacon certificate push revocation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CSAW '08: Proceedings of the 2nd ACM workshop on Computer security architectures
            October 2008
            72 pages
            ISBN:9781605583006
            DOI:10.1145/1456508

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 31 October 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader