Henry, 1999 - Google Patents
Who's got the key?Henry, 1999
View PDF- Document ID
- 8140659191493492624
- Author
- Henry D
- Publication year
- Publication venue
- Proceedings of the 27th annual ACM SIGUCCS conference on User services: Mile high expectations
External Links
Snippet
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptography, digital signatures, trust models, and digital certificates. In addition, this paper reviews some …
- 230000001010 compromised 0 description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adams et al. | Understanding public-key infrastructure: concepts, standards, and deployment considerations | |
Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
US12088568B2 (en) | Systems and methods for secure key service | |
Buchmann et al. | Introduction to public key infrastructures | |
US20210089676A1 (en) | Methods and systems for secure data exchange | |
US9397839B2 (en) | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI) | |
Ellison | The nature of a useable PKI | |
US20020062451A1 (en) | System and method of providing communication security | |
Henry | Who's got the key? | |
Alniamy et al. | Blockchain-based secure collaboration platform for sharing and accessing scientific research data | |
Mont et al. | IBE applied to privacy and identity management | |
Fatima et al. | X. 509 and PGP Public Key Infrastructure methods: A critical | |
Pranata et al. | A distributed mechanism for secure collaboration in Digital Ecosystems | |
VATRA | Public key infrastructure overview | |
Johnson et al. | Digital Signature in ITR filing | |
Knox et al. | Digital credentials with privacy‐preserving delegation | |
Braga | Fostering e-government in Brazil: a case study of digital certification adoption | |
Boeyen et al. | Trust models guidelines | |
Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
Benson | Portable security transaction protocol | |
Authority | X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 10.0 April 30, 2019 | |
Authority | X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 8.0 August 29, 2018 | |
Titi et al. | Protecting E-courses Copyright in M-learning Process | |
Woodward et al. | PKI and access control in office environments | |
Authority | X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 7.0 March 12, 2018 |