TY - GEN
T1 - Efficient user revocation for privacy-aware PKI
AU - Ren, Wei
AU - Ren, Kui
AU - Lou, Wenjing
AU - Zhang, Yanchao
N1 - Publisher Copyright:
© Copyright 2008 ICST.
PY - 2008
Y1 - 2008
N2 - Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.
AB - Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.
KW - PKI
KW - Privacy
KW - Security
KW - User revocation
UR - http://www.scopus.com/inward/record.url?scp=84911191578&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84911191578&partnerID=8YFLogxK
U2 - 10.4108/ICST.QSHINE2008.3824
DO - 10.4108/ICST.QSHINE2008.3824
M3 - Conference contribution
AN - SCOPUS:84911191578
T3 - QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
BT - QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
A2 - Cao, Jiannong
A2 - Ni, Lionel
PB - ICST
T2 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008
Y2 - 28 July 2008 through 31 July 2008
ER -