ECPV: Efficient certificate path validation in public-key infrastructure

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user's certificate as well as the existence of a path from its trust points to the CA of the certificate. The latter part is referred to as certificate path validation. In this paper, we suggest an efficient certificate path validation scheme (ECPV) that employs delegation with efficient computing at relying parties. In particular, in our scheme, a relying party is provided with certificate path validation trees (CPVTs) depending on its trust points and applicable trust policies. This information should enable a relying party to perform certificate path validation locally. The CPVAs can be deployed either as autonomous entities or in a federated mode. We discuss the two major components of ECPV: the data harvester and the data analyzer. Some of the concerns of security, trust, and performance are also discussed. © 2004 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Halappanavar, M., & Mukkamala, R. (2004). ECPV: Efficient certificate path validation in public-key infrastructure. In IFIP Advances in Information and Communication Technology (Vol. 142, pp. 215–228). Springer New York LLC. https://doi.org/10.1007/1-4020-8070-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free