2002
DOI: 10.1109/mc.2002.1023787
|View full text |Cite
|
Sign up to set email alerts
|

PKI: it's not dead, just resting

Abstract: Despite enthusiastic predictions in the trade press, an X.509-style PKI has so far failed to eventuate to any significant degree. This paper looks at some of the reasons behind this, examining why a pure X.509-style PKI may never appear outside a few closed, highly-controlled environments such as government agencies. On the other hand there are many instances in which situation-and application-specific uses of certificates can be employed in a manner which avoids the shortcomings of X.509's one-size-(mis)fits-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
6

Year Published

2003
2003
2017
2017

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 146 publications
(60 citation statements)
references
References 7 publications
0
52
0
6
Order By: Relevance
“…In traditional PKI, this assurance is delivered in the form of a signed certificate from a trusted authority [35]. However, there are many issues with PKI associated with certificate management, including key storage, distribution and revocation, as outlined in [36]. Popular E2E-encrypted tools (e.g., iMessage, WhatsApp, Signal) relieve users of key management; they simply query a trusted server that vouches for the authentic public keys of other users.…”
Section: A Secure Communicationsmentioning
confidence: 99%
“…In traditional PKI, this assurance is delivered in the form of a signed certificate from a trusted authority [35]. However, there are many issues with PKI associated with certificate management, including key storage, distribution and revocation, as outlined in [36]. Popular E2E-encrypted tools (e.g., iMessage, WhatsApp, Signal) relieve users of key management; they simply query a trusted server that vouches for the authentic public keys of other users.…”
Section: A Secure Communicationsmentioning
confidence: 99%
“…In a traditional Public Key Infrastructure (PKI), this assurance is delivered in the form of certificate, essentially a signature by a Certification Authority (CA) on a public key [1]. The problems of PKI technology are well documented, see for example [16]. Of note are the issues associated with certificate management, including revocation, storage and distribution and the computational cost of certificate verification.…”
Section: Introductionmentioning
confidence: 99%
“…PKI is based on Public Key Cryptography discovered by Diffie & Hellman (1976) combined with certification of public keys as proposed by Kohnfelder (1978). An exhaustive presentation of the evolution and principles of PKI is found for example in (Gutmann, 2002). PKI is a basis for two-factor authentication and digital signature services.…”
Section: Background and Related Researchmentioning
confidence: 99%