Pairing heaps: experiments and analysis
Communications of the ACM
The Data Compression Book
On Certificate Revocation and Validation
FC '98 Proceedings of the Second International Conference on Financial Cryptography
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Evaluation of Revocation Systems with a JAVA Test-bed
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.00 |
Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI) can respectively be used to support authentication and authorization in distributed scenarios. Certificate path processing is a critical issue in both infrastructures, because it requires several costly processes, such as certificate path discovery, validation of the digital signature and checking the revocation status of each certificate. The problem becomes much more complex when using delegation of privileges in a PMI, because in this case the length of the delegation paths can be high. In this paper, we propose a revocation scheme devised to reduce the communication and computational overhead for certificate status checking in delegation paths. This goal is achieved by using suitable coding techniques.