Mostra el registre d'ítem simple

dc.contributor.authorMuñoz Tapia, José Luis
dc.contributor.authorForné Muñoz, Jorge
dc.contributor.authorEsparza Martín, Óscar
dc.contributor.authorSoriano Ibáñez, Miguel
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2014-06-17T13:13:55Z
dc.date.created2004-01
dc.date.issued2004-01
dc.identifier.citationMuñoz, J. [et al.]. Certificate revocation system implementation based on the Merkle Hash Tree. "International journal of information security", Gener 2004, vol. 2, núm. 2, p. 110-124.
dc.identifier.issn1615-5262
dc.identifier.urihttp://hdl.handle.net/2117/23248
dc.description.abstractPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies one of its major costs. The goal of this article is to explain in detail a certificate revocation system based on the Merkle hash tree (MHT) called AD–MHT. AD–MHT uses the data structures proposed by Naor and Nissim in their authenticated dictionary (AD) [20]. This work describes the tools used and the details of the AD–MHT implementation. The authors also address important issues not addressed in the original AD proposal, such as responding to a request, revoking a certificate, deleting an expired certificate, the status checking protocol for communicating the AD–MHT repository with the users, verifying a response, system security, and, finally, performance evaluation.
dc.format.extent15 p.
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshCryptography
dc.subject.lcshComputer security
dc.subject.otherPublic-key infrastructure
dc.subject.otherCertificate revocation
dc.subject.otherMerkle hash tree
dc.titleCertificate revocation system implementation based on the Merkle Hash Tree
dc.typeArticle
dc.subject.lemacCriptografia
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics
dc.identifier.doi10.1007/s10207-003-0026-4
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://link.springer.com/article/10.1007/s10207-003-0026-4
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac679887
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorMuñoz, J.; Forne, J.; Esparza, O.; Soriano, M.
local.citation.publicationNameInternational journal of information security
local.citation.volume2
local.citation.number2
local.citation.startingPage110
local.citation.endingPage124


Fitxers d'aquest items

Imatge en miniatura

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple