Sciweavers

43 search results - page 1 / 9
» The Key Authority - Secure Key Management in Hierarchical Pu...
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
13 years 10 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
SIGUCCS
1999
ACM
13 years 9 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
ISW
2004
Springer
13 years 10 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
WETICE
2000
IEEE
13 years 9 months ago
Walking the Web of Trust
Most currently deployed Public Key Infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usa...
Germano Caronni