Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A More Efficient Use of Delta-CRLs
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Ultra-low power data storage for sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Introduction to Probability Models, Ninth Edition
Introduction to Probability Models, Ninth Edition
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
An anonymous credential system and a privacy-aware PKI
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Quasi-efficient revocation of group signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
Verifier-Local revocation group signature schemes with backward unlinkability from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Certificate revocation and certificate update
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.