Sciweavers

43 search results - page 1 / 9
» The Key Authority - Secure Key Management in Hierarchical Pu...
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
13 years 11 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
SIGUCCS
1999
ACM
13 years 10 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
ISW
2004
Springer
13 years 11 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
WETICE
2000
IEEE
13 years 10 months ago
Walking the Web of Trust
Most currently deployed Public Key Infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usa...
Germano Caronni