Ansper et al., 2001 - Google Patents
Efficient long-term validation of digital signaturesAnsper et al., 2001
View PDF- Document ID
- 12671777305940230308
- Author
- Ansper A
- Buldas A
- Roos M
- Willemson J
- Publication year
- Publication venue
- Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings 4
External Links
Snippet
Digitally signed documents (eg contracts) would quickly lose their validity if the signing keys were revoked or the signature scheme was broken. The conventional validation techniques have been designed just for ephemeral use of signatures and are impractical for long-term …
- 238000010200 validation analysis 0 title abstract description 47
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6282295B1 (en) | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers | |
US8744077B2 (en) | Cryptographic encoding and decoding of secret data | |
Asokan et al. | Server-supported signatures | |
Sun | Design of time-stamped proxy signatures with traceable receivers | |
Yang et al. | On the efficiency of nonrepudiable threshold proxy signature scheme with known signers | |
Toorani et al. | LPKI-a lightweight public key infrastructure for the mobile environments | |
Benantar | The Internet public key infrastructure | |
Ansper et al. | Efficient long-term validation of digital signatures | |
Kamil et al. | A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing | |
Kwon | Privacy preservation with X. 509 standard certificates | |
Chandrasekhar et al. | Efficient proxy signatures based on trapdoor hash functions | |
Zhu et al. | Generating correlated digital certificates: framework and applications | |
Buldas et al. | Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world | |
KR20010013155A (en) | Auto-recoverable auto-certifiable cryptosystems | |
Seo et al. | A mediated proxy signature scheme with fast revocation for electronic transactions | |
Nkurunziza et al. | ECAAP‐SG: Efficient certificateless anonymous authentication protocol for SG | |
Quercia et al. | Tata: Towards anonymous trusted authentication | |
Ding et al. | Equipping smart devices with public key signatures | |
Koga et al. | A distributed online certificate status protocol with a single public key | |
Al-Ibrahim et al. | Proxy and threshold one-time signatures | |
Nakanishi et al. | A group signature scheme with efficient membership revocation for reasonable groups | |
Lu et al. | A Time-stamping Proxy Signature Scheme Using Time-stamping Service. | |
Hsu et al. | Group-oriented signature scheme with distinguished signing authorities | |
Bao | Introducing decryption authority into PKI | |
Pu et al. | Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs |