Browse > Article

Practical Improvement of An Efficient Public-Key framework and Its Application  

Yang Jong-Phil (큐슈대학교 시스템정보과학부)
Shin Weon (동명정보대학교 정보보호학과)
Rhee Kyung-Hyune (부경대학교 전자컴퓨터정보통신공학부)
Abstract
J. Zhou et al. proposed a new public-key framewort in which the maximum lifetime of a certificate is divided into short periods and the certificate could be expired at the end of any period under the control of the certificate owner(or his manager in a corporate environment). However, J. Zhou et al.'s public-key framework is not suitable on implementation in real world. Therefore, we review some security Parameters to change them into more suitable ones for implementation and remove an unnecessary trust party of J. Zhou et al.'s public-key framework. Then, we propose an improved scheme for realistic solution. Moreover, we present a practical application based on the improved framework.
Keywords
Public Hey Infrastructure; Certificate Revocation; Authentication; Security Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, 'X.509 Internet public key infrastructure on-line certificate status protocol (OCSP),' RFC 2560, (1999)
2 N. Asokan, G.Tsudik and M.Waidner, 'Server-Supported Signatures,' European Symposium on Research in Computer Security, pp.131-143, (1996)
3 P. McDaniel and S. Jamin, 'Windowed certificate revocation,' Proceedings of IEEE INFOCOM'2000, Tel-Aviv, Israel, pp.1406-1414, (2000)
4 S. Halevi and H. Krawczyk, 'Public-Key Cryptography And Password Protocols,' In 5th ACM Conference on Computer and Communication Security, San Francisco, California, pp.122-131, (1998)
5 Steven M. Bellovin, 'Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks,' Proceedings of the IEEE Symposium on research in Security and Privacy, Oakland, , pp.72-84, (1992)
6 M. Naor and K. Nissim, 'Certificate revocation and certificate update,' Proceedings 7th USENIX Security Symposium, San Antonio, Texas, pp.217-228, (1998)
7 Peter Buhler, Thomas Eirich, Michael Stenier and Michael Waidner, 'Secure Password-Based Cipher Suite For TLS,' In Symposium on Network and Distributed Systems Security (NDSS '00), pp.129-142, (2000)
8 D. Cooper, 'A more efficient use of delta-CRLs,' Proceeding of 2000 IEEE Symposium on Security and Privacy, pp.190-202, (2000)
9 R. Housley, W. Ford, W. Polk and D. Solo, 'Internet X.509 public key infrastructure certificate and CRL profile,' RFC 2459, (1999)
10 N. Haller, 'The S/Key One-time Password System,' Proceeding of ISOC Symposium on Network and Distributed System Security, pp.151-157, (1994)
11 S. Micali, 'Efficient Certificate revocation,' Technical Memo MIT/LCS/TM-542b, (1996)
12 J. Yang, W. Shin and K. Rhee, 'An end-to-end authentication protocol in Wireless Application Protocol,' ACISP 2001, LNCS 2119, pp.247-259, (2001)
13 C. Adams and S. Lloyd, 'Understanding public-key infrastructure: concepts, standard, and deployment considerations,' Indianapolis: Macmillan Technical Publishing, (1999)
14 J. Zhou, F. Bao and R. Deng, 'An Efficient Public-Key Framework,' 5th International Conference on Information and Communications Security, LNCS 2836, pp.88-99, (2003)