2011
DOI: 10.1007/978-3-642-22633-5_1
|View full text |Cite
|
Sign up to set email alerts
|

PorKI: Portable PKI Credentials via Proxy Certificates

Abstract: Abstract. Authenticating human users using public key cryptography provides a number of useful security properties, such as being able to authenticate to remote party without giving away a secret. However, in many scenarios, users need to authenticate from a number of client machines, of varying degrees of trustworthiness. In previous work, we proposed an approach to solving this problem by giving users portable devices which wirelessly issue temporary, limited-use proxy certificates to the clients. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
(12 reference statements)
0
4
0
Order By: Relevance
“…Related solutions in literature, such as [10], rely on a smartphone and transfer a proxy credential to the browser on the workstation. The browser can then use this credential to set up mutually authenticated HTTPS sessions with servers.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…Related solutions in literature, such as [10], rely on a smartphone and transfer a proxy credential to the browser on the workstation. The browser can then use this credential to set up mutually authenticated HTTPS sessions with servers.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…Our work generalizes the PAD concept to a personal identification device with extended functionality (e.g., support for multiple identity providers, deanonymization) and a concrete implementation is presented. A similar approach is taken in PorKI [12] where users can delegate temporary proxy credentials to workstations using their mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…Later work on the PorKI project that is not reflected here is discussed by Pala et al[68] 4. In many cases, users will have separate keypairs for signing and encryption purposes.…”
mentioning
confidence: 99%
“…Our lab later demonstrated the feasibility of adapting PorKI to smartphones by implementing it on an iPhone [68]…”
mentioning
confidence: 99%