2004
DOI: 10.1007/978-3-540-25980-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Using LDAP Directories for Management of PKI Processes

Abstract: Abstract. We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP servers are used for administrating infrastructure processes. One application of this framework is a method for providing proof-of-possession, especially in the case of encryption keys. Another one is the secure delivery of software personal security environments.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 11 publications
(10 reference statements)
0
5
0
Order By: Relevance
“…This assures that a certicate cannot be used before the entity has updated its local data. The process can be enhanced to an indirect proof-of-possession as described in [8], if the entity's key-pair can be used for encryption. In this case the certicate would not be put in the attribute hiddenUserCertificate, but be encrypted with the contained public key and written to userEncryptedCertificate.…”
Section: Registration and Initial Certicationmentioning
confidence: 99%
See 4 more Smart Citations
“…This assures that a certicate cannot be used before the entity has updated its local data. The process can be enhanced to an indirect proof-of-possession as described in [8], if the entity's key-pair can be used for encryption. In this case the certicate would not be put in the attribute hiddenUserCertificate, but be encrypted with the contained public key and written to userEncryptedCertificate.…”
Section: Registration and Initial Certicationmentioning
confidence: 99%
“…It allows them to download the certicates from the LDAP, store them on the smart card and write them back to the userCertificate attribute. The application supports proof-ofpossession by using the userEncryptedCertificate attribute as proposed in [8].…”
Section: Case Studymentioning
confidence: 99%
See 3 more Smart Citations