Key validation using weighted-edge web of trust model

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Public key cryptography is widely used in the establishment of secure communication. An important issue in the use of public key cryptography is to ensure that a public key actually belongs to its owner. This problem is referred to as the key validation problem. One solution to this key validation problem is the centralized public key infrastructure (PKI) model ([1]). A second alternative is the decentralized Web of Trust model ([2]). In this model a user depends on digital certificate introduced by other users, who may be trustworthy or otherwise, to establish the binding between a public key and its owner. In this work we propose to model the trust relationship between users as weighted edges. We propose an algorithm to find trusted paths and thus validate public keys. The proposed algorithm is simple and has a low complexity both in terms of time and space. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Kumar, S., Singh, N., & Sairam, A. S. (2011). Key validation using weighted-edge web of trust model. In Communications in Computer and Information Science (Vol. 147 CCIS, pp. 156–161). https://doi.org/10.1007/978-3-642-20573-6_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free