Distributing security-mediated PKI revisited

  • Authors:
  • Jong-Phil Yang;Kouichi Sakurai;Kyung Hyune Rhee

  • Affiliations:
  • Graduate School of Information Science and Electrical Engineering, Kyushu University, Higashi-ku, Fukuoka, Japan;Graduate School of Information Science and Electrical Engineering, Kyushu University, Higashi-ku, Fukuoka, Japan;Division of Electronic, Computer and Telecommunication Engineering, Pukyong National University, Pusan, Republic of Korea

  • Venue:
  • EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
  • Year:
  • 2006
  • Instant Revocation

    EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice

Quantified Score

Hi-index 0.00

Visualization

Abstract

The SEM approach to PKI offers several advantages, such as immediate revocation of users’ signing ability without CRLs and compatibility with the standard RSA. However, it has a weakness against denial of service attack caused by breaking down or being compromised. G. Vanrenen et al. proposed a distributed SEM approach to overcome the weakness. However, it does not provide the desirable properties such as instant availability and immunity against denial of service attack, due to inadequate usage of threshold cryptography and proactive secret sharing. In this paper, we point out its structural shortcomings and propose a modified version.