2018
DOI: 10.1155/2018/7379364
|View full text |Cite
|
Sign up to set email alerts
|

WPKI Certificate Verification Scheme Based on Certificate Digest Signature-Online Certificate Status Protocol

Abstract: Aiming at the problems of the WPKI certificate verification schemes based on online certificate status protocol (OCSP), this paper proposes a WPKI certificate verification scheme based on the certificate digest signature-online certificate status protocol (CDS OCSP). Compared with the existing schemes, the proposed scheme optimizes the number of communication connections between the communication entities and the network, reduces the consumption of the wireless network bandwidth in the certificate verification… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Furthermore, session keys are negotiated between two parties, which can safeguard subsequent interactions. Ra et al [15] proposed a KSI-based smart home secure communication scheme, a three-layer blockchain-based IoT smart home security architecture that includes blockchain, authentication and application layers with numerous characteristics including identity authentication, privacy preserving and access control. KSI uses a single-use key for user authentication and generates a server-based global timestamp and blockchain for transaction records [16].…”
Section: Identity Access Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, session keys are negotiated between two parties, which can safeguard subsequent interactions. Ra et al [15] proposed a KSI-based smart home secure communication scheme, a three-layer blockchain-based IoT smart home security architecture that includes blockchain, authentication and application layers with numerous characteristics including identity authentication, privacy preserving and access control. KSI uses a single-use key for user authentication and generates a server-based global timestamp and blockchain for transaction records [16].…”
Section: Identity Access Managementmentioning
confidence: 99%
“…Finally, it has immunity from single point of failure through distributed and hierarchical layer blockchain servers. In particular, the existing public key method [4], [13]- [15], [18] is dangerous for message stealing and manipulation after the private key is exposed. do.…”
Section: Remarks and Related Workmentioning
confidence: 99%