CRYPTO '89 Proceedings on Advances in cryptology
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Efficient fault-tolerant certificate revocation
Proceedings of the 7th ACM conference on Computer and communications security
Digital certificates: a survey of revocation methods
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Fast Digital Identity Revocation (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
On Certificate Revocation and Validation
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Revocation: Options and Challenges
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Efficient and Fresh Cerification
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Model of Certificate Revocation
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
A novel approach to on-line status authentication of public-key certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
A More Efficient Use of Delta-CRLs
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Enhanced Certificate Revocation System
Enhanced Certificate Revocation System
Efficient Certificate Revocation
Efficient Certificate Revocation
Strongman: a scalable solution to trust management in networks
Strongman: a scalable solution to trust management in networks
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Empirical Analysis of Certificate Revocation Lists
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Towards the development of privacy-aware systems
Information and Software Technology
Certificate revocation release policies
Journal of Computer Security
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Reducing the cost of certificate revocation: a case study
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
A new public key certificate revocation scheme based on one-way hash chain
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Digital certificate management: Optimal pricing and CRL releasing strategies
Decision Support Systems
Hi-index | 0.00 |
Cryptographic certificates are a powerful tool for security concerned applications where the participants must be authenticated in order to access some resources or commit a transaction. However, due to various reasons, the validity of such certificates can change over time, introducing the risk of an invalid certificate being used to authenticate an entity. Various methods of mitigating this risk have been devised, known broadly as "certificate revocation" schemes. In this paper, we categorize and analyze them based on our identified characteristics. We further discuss tradeoffs among them and suggest how system designers might apply the analyses.