In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user's certificate as well as the existence of a path from its trust points to the CA of the certificate. The latter part is referred to as certificate path validation. In this paper, we suggest an efficient certificate path validation scheme (ECPV) that employs delegation with efficient computing at relying parties. In particular, in our scheme, a relying party is provided with certificate path validation trees (CPVTs) depending on its trust points and applicable trust policies. This information should enable a relying party to perform certificate path validation locally. The CPVAs can be deployed either as autonomous entities or in a federated mode. We discuss the two major components of ECPV: the data harvester and the data analyzer. Some of the concerns of security, trust, and performance are also discussed. © 2004 by International Federation for Information Processing.
CITATION STYLE
Halappanavar, M., & Mukkamala, R. (2004). ECPV: Efficient certificate path validation in public-key infrastructure. In IFIP Advances in Information and Communication Technology (Vol. 142, pp. 215–228). Springer New York LLC. https://doi.org/10.1007/1-4020-8070-0_16
Mendeley helps you to discover research relevant for your work.