Henry, 1999 - Google Patents
Who's got the key?Henry, 1999
View PDF- Document ID
- 8140659191493492624
- Author
- Henry D
- Publication year
- Publication venue
- Proceedings of the 27th annual ACM SIGUCCS conference on User services: Mile high expectations
External Links
Snippet
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptography, digital signatures, trust models, and digital certificates. In addition, this paper reviews some …
- 230000001010 compromised 0 description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12088568B2 (en) | Systems and methods for secure key service | |
| Adams et al. | Understanding public-key infrastructure: concepts, standards, and deployment considerations | |
| Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
| Buchmann et al. | Introduction to public key infrastructures | |
| US20210089676A1 (en) | Methods and systems for secure data exchange | |
| US9397839B2 (en) | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI) | |
| Ellison | The nature of a useable PKI | |
| US20020062451A1 (en) | System and method of providing communication security | |
| EP1164745A2 (en) | System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature | |
| Henry | Who's got the key? | |
| Alniamy et al. | Blockchain-based secure collaboration platform for sharing and accessing scientific research data | |
| Mont et al. | IBE applied to privacy and identity management | |
| Pranata et al. | A distributed mechanism for secure collaboration in Digital Ecosystems | |
| Fatima et al. | X. 509 and PGP Public Key Infrastructure methods: A critical | |
| VATRA | Public key infrastructure overview | |
| Johnson et al. | Digital Signature in ITR filing | |
| Knox et al. | Digital credentials with privacy‐preserving delegation | |
| Braga | Fostering e-government in Brazil: a case study of digital certification adoption | |
| Kaziyeva et al. | The ECTLC-Horcrux Protocol for Decentralized Biometric-Based Self-Sovereign Identity with Time-Lapse Encryption. | |
| Boeyen et al. | Trust models guidelines | |
| Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
| Benson | Portable security transaction protocol | |
| Authority | X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 10.0 April 30, 2019 | |
| Mowbray | Implementing pseudonymity | |
| Authority | X. 509 Certificate Policy For The TSCP Bridge Certification Authority (TBCA) Version 8.0 August 29, 2018 |