In this paper we present a new approach for the conventional X.509 Public Key Infrastructures (PKI). Our goal is to reduce the effort to handle sig- natures in the long term. The novelty is that a Root CA reissues subordinate certificates of final users, but adjusting validity periods to exclude the periods after a revocation. The Root CA also authenticates timestamps. The result is the cleaned PKI, which is simpler than the conventional PKI because: a) there is no revocation; b) there is no intermediary Certification Authority; c) signatures are trustworthy as long as the used cryptographic algorithms remain secure. As benefits, we reduce the need of timestamps and consequently the demand for storage space and processing time to use signed...
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) ma...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
In this paper we present a new approach for the conventional X.509 Public Key Infrastructures (PKI)....
We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and ...
Abstract. We propose a new Public Key Infrastructure model for longterm signatures. It is based on X...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
\u3cp\u3eRecent attacks and publications have shown the vulnerability of hierarchical Public Key Inf...
Abstract. Recent attacks and publications have shown the vulnerabil-ity of hierarchical Public Key I...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Current X.509-based PKIs are typically complex. One of the most critical parts is revocation checkin...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
The PKI framework is a widely used network identity verification framework. Users will register thei...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) ma...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
In this paper we present a new approach for the conventional X.509 Public Key Infrastructures (PKI)....
We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and ...
Abstract. We propose a new Public Key Infrastructure model for longterm signatures. It is based on X...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
\u3cp\u3eRecent attacks and publications have shown the vulnerability of hierarchical Public Key Inf...
Abstract. Recent attacks and publications have shown the vulnerabil-ity of hierarchical Public Key I...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Current X.509-based PKIs are typically complex. One of the most critical parts is revocation checkin...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
The PKI framework is a widely used network identity verification framework. Users will register thei...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) ma...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...