Mostra el registre d'ítem simple
Certificate revocation system implementation based on the Merkle Hash Tree
dc.contributor.author | Muñoz Tapia, José Luis |
dc.contributor.author | Forné Muñoz, Jorge |
dc.contributor.author | Esparza Martín, Óscar |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2014-06-17T13:13:55Z |
dc.date.created | 2004-01 |
dc.date.issued | 2004-01 |
dc.identifier.citation | Muñoz, J. [et al.]. Certificate revocation system implementation based on the Merkle Hash Tree. "International journal of information security", Gener 2004, vol. 2, núm. 2, p. 110-124. |
dc.identifier.issn | 1615-5262 |
dc.identifier.uri | http://hdl.handle.net/2117/23248 |
dc.description.abstract | Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies one of its major costs. The goal of this article is to explain in detail a certificate revocation system based on the Merkle hash tree (MHT) called AD–MHT. AD–MHT uses the data structures proposed by Naor and Nissim in their authenticated dictionary (AD) [20]. This work describes the tools used and the details of the AD–MHT implementation. The authors also address important issues not addressed in the original AD proposal, such as responding to a request, revoking a certificate, deleting an expired certificate, the status checking protocol for communicating the AD–MHT repository with the users, verifying a response, system security, and, finally, performance evaluation. |
dc.format.extent | 15 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject.lcsh | Cryptography |
dc.subject.lcsh | Computer security |
dc.subject.other | Public-key infrastructure |
dc.subject.other | Certificate revocation |
dc.subject.other | Merkle hash tree |
dc.title | Certificate revocation system implementation based on the Merkle Hash Tree |
dc.type | Article |
dc.subject.lemac | Criptografia |
dc.subject.lemac | Seguretat informàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1007/s10207-003-0026-4 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://link.springer.com/article/10.1007/s10207-003-0026-4 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 679887 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Muñoz, J.; Forne, J.; Esparza, O.; Soriano, M. |
local.citation.publicationName | International journal of information security |
local.citation.volume | 2 |
local.citation.number | 2 |
local.citation.startingPage | 110 |
local.citation.endingPage | 124 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [481]
-
Articles de revista [56]