View Full Document

DISTRIBUTING SECURITY-MEDIATED PKI



View the full content.
View Full Document
View Full Document

19 views

Unformatted text preview:

Int J Inf Secur 2005 DOI 10 1007 s10207 005 0076 x S P E C I A L I S S U E PA P E R Gabriel Vanrenen Sean Smith John Marchesini Distributing security mediated PKI Published online 19 July 2005 c Springer Verlag 2005 Abstract The security mediated approach to PKI offers several advantages such as instant revocation and compatibility with standard RSA tools In this paper we present a design and prototype that addresses its trust and scalability problems We use trusted computing platforms linked with peer to peer networks to create a network of trustworthy mediators and improve availability We use threshold cryptography to build a back up and migration technique which allows recovery from a mediator crashing while also avoiding having all mediators share all secrets We then use strong forward secrecy with this migration to mitigate the damage should a crashed mediator actually be compromised Keywords SEM Peer to peer Trusted computing 1 Introduction The security mediated approach to PKI by Boneh et al 3 4 offers many advantages However it has some disadvantages with regard to trust and scalability each user depends on a mediator that may go down or become compromised In this paper we apply tools including peer to peer computing and trusted computing platforms to distribute the security mediated approach to PKI and thus preserve its advantages while overcoming its scalability reliability and trust problems Section 2 reviews the security mediated approach and discusses its advantages and disadvantages Section 3 discusses the tools we apply to this problem Section 4 discusses the design we build with these tools Section 5 discusses our prototype Section 6 discusses some related approaches Section 7 discusses some conclusions and future work G Vanrenen B S Smith J Marchesini Department of Computer Science PKI Lab Dartmouth College Hanover NH 03755 USA E mail gabriel vanrenen alum dartmouth org sws cs dartmouth edu carlo cs dartmouth edu 2 SEM 2 1 Motivation Because it does



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view DISTRIBUTING SECURITY-MEDIATED PKI and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view DISTRIBUTING SECURITY-MEDIATED PKI and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?