[go: nahoru, domu]

Ansper et al., 2001 - Google Patents

Efficient long-term validation of digital signatures

Ansper et al., 2001

View PDF
Document ID
12671777305940230308
Author
Ansper A
Buldas A
Roos M
Willemson J
Publication year
Publication venue
Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings 4

External Links

Snippet

Digitally signed documents (eg contracts) would quickly lose their validity if the signing keys were revoked or the signature scheme was broken. The conventional validation techniques have been designed just for ephemeral use of signatures and are impractical for long-term …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model

Similar Documents

Publication Publication Date Title
US6282295B1 (en) Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers
US8744077B2 (en) Cryptographic encoding and decoding of secret data
Asokan et al. Server-supported signatures
Sun Design of time-stamped proxy signatures with traceable receivers
Yang et al. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Toorani et al. LPKI-a lightweight public key infrastructure for the mobile environments
Benantar The Internet public key infrastructure
Ansper et al. Efficient long-term validation of digital signatures
Kamil et al. A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing
Kwon Privacy preservation with X. 509 standard certificates
Chandrasekhar et al. Efficient proxy signatures based on trapdoor hash functions
Zhu et al. Generating correlated digital certificates: framework and applications
Buldas et al. Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world
KR20010013155A (en) Auto-recoverable auto-certifiable cryptosystems
Seo et al. A mediated proxy signature scheme with fast revocation for electronic transactions
Nkurunziza et al. ECAAP‐SG: Efficient certificateless anonymous authentication protocol for SG
Quercia et al. Tata: Towards anonymous trusted authentication
Ding et al. Equipping smart devices with public key signatures
Koga et al. A distributed online certificate status protocol with a single public key
Al-Ibrahim et al. Proxy and threshold one-time signatures
Nakanishi et al. A group signature scheme with efficient membership revocation for reasonable groups
Lu et al. A Time-stamping Proxy Signature Scheme Using Time-stamping Service.
Hsu et al. Group-oriented signature scheme with distinguished signing authorities
Bao Introducing decryption authority into PKI
Pu et al. Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs