TY - GEN
T1 - PKI trust relationships
T2 - 1st International Conference on Availability, Reliability and Security, ARES 2006
AU - Satizábal, Cristina
AU - Páez, Rafael
AU - Forné, Jordi
PY - 2006
Y1 - 2006
N2 - Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified through the certification path validation process, which involves: path discovery, signature verification and revocation status checking. When trust relationships are bidirectional, multiple paths can exist between two entities, which increase the runtime of the path discovery process. In addition, validation of long paths can be difficult, especially when storage and processing capacities of the verifier are limited. In this paper, we propose a protocol to establish a hierarchical trust model from a PKI with unidirectional and bidirectional trust relationships. This protocol makes more efficient the path validation process since in a hierarchical model, trust relationships are unidirectional and paths are easy to find. In addition, our protocol allows setting a maximum path length, so it can be adapted to the features of users' terminals.
AB - Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified through the certification path validation process, which involves: path discovery, signature verification and revocation status checking. When trust relationships are bidirectional, multiple paths can exist between two entities, which increase the runtime of the path discovery process. In addition, validation of long paths can be difficult, especially when storage and processing capacities of the verifier are limited. In this paper, we propose a protocol to establish a hierarchical trust model from a PKI with unidirectional and bidirectional trust relationships. This protocol makes more efficient the path validation process since in a hierarchical model, trust relationships are unidirectional and paths are easy to find. In addition, our protocol allows setting a maximum path length, so it can be adapted to the features of users' terminals.
UR - http://www.scopus.com/inward/record.url?scp=33750941735&partnerID=8YFLogxK
U2 - 10.1109/ARES.2006.93
DO - 10.1109/ARES.2006.93
M3 - Conference contribution
AN - SCOPUS:33750941735
SN - 0769525679
SN - 9780769525679
T3 - Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
SP - 563
EP - 570
BT - Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
Y2 - 20 April 2006 through 22 April 2006
ER -