Electronic signatures replace handwritten signatures in electronic processes. In this context, non-repudiation is one of the most desired properties – yet in practice it cannot be provided by the signature schemes themselves. Therefore, additional mechanisms in the underlying public key infrastructure are required. In this work, we present a formal treatment of that issue. We extend the formal model for public key infrastructures by Maurer introducing transitions to make it dynamic. We use the extended model to evaluate the relationship between non-repudiation and revocation and prove that backdated revocation always destroys the non-repudiation property. We prove that forward secure signatures can be used to maintain non-repudiation, rende...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
International audienceWhile extensive research addresses the problem of establishing session keys th...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
\u3cp\u3eRecent attacks and publications have shown the vulnerability of hierarchical Public Key Inf...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
Abstract. Recent attacks and publications have shown the vulnerabil-ity of hierarchical Public Key I...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
Abstract – This work is to have significant instance-management functions regarding digital sig-natu...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
In this paper we present a new approach for the conventional X.509 Public Key Infrastructures (PKI)....
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
Public key infrastructure provides a promising foundation for verifying the authenticity of communic...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
International audienceWhile extensive research addresses the problem of establishing session keys th...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
\u3cp\u3eRecent attacks and publications have shown the vulnerability of hierarchical Public Key Inf...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
Abstract. Recent attacks and publications have shown the vulnerabil-ity of hierarchical Public Key I...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
Abstract – This work is to have significant instance-management functions regarding digital sig-natu...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
In this paper we present a new approach for the conventional X.509 Public Key Infrastructures (PKI)....
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
AbstractWe propose the concept of fine-grained forward-secure signature schemes. Such signature sche...
Public key infrastructure provides a promising foundation for verifying the authenticity of communic...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
International audienceWhile extensive research addresses the problem of establishing session keys th...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...