2005
DOI: 10.1007/s10207-005-0076-x
|View full text |Cite
|
Sign up to set email alerts
|

Distributing security-mediated PKI

Abstract: The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and prototype that addresses its trust and scalability problems. We use trusted computing platforms linked with peer-to-peer networks to create a network of trustworthy mediators and improve availability. We use threshold cryptography to build a back-up and migration technique which allows recovery from a mediator crashing while also avoiding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“… to use a custom hardware‐accelerated encryption and storage platform. In is described a platform for implementing a distributed security‐mediated PKI using a peer‐to‐peer system. The work includes the use of a trusted computing platform in order to secure the communications between couples of islands and form a distributed PKI.…”
Section: Related Workmentioning
confidence: 99%
“… to use a custom hardware‐accelerated encryption and storage platform. In is described a platform for implementing a distributed security‐mediated PKI using a peer‐to‐peer system. The work includes the use of a trusted computing platform in order to secure the communications between couples of islands and form a distributed PKI.…”
Section: Related Workmentioning
confidence: 99%
“…One of the standard solutions is to apply threshold cryptography to distribute the SEMkey. In [20], apart from assigning one of the SEMs to hold the original SEM-key, the SEM-key is replicated in the form of a number of shares across multiple SEMs. However, their solution have not considered obtaining partial token from the SEMs holding a share of the SEM-key.…”
Section: Sem Predefined Instant Escrow Implicit Freementioning
confidence: 99%
“…Our lab has investigated and developed a number of applications for the IBM 4758 secure coprocessor including hardening Apache [14,33] (as noted earlier), enhancing privacy [11], hardening S/MIME [23], and exploring new PKI architectures [18,41]. Many of these projects were repeatedly hampered by the 4758's relatively weak computational power and lack of space.…”
Section: Related Workmentioning
confidence: 99%