Privacy protection in PKIs: A separation-of-authority approach

Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jae Il Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Due to the growing number of privacy infringement problems, there are increasing demands for privacy enhancing techniques on the Internet. In the PKIs, authorized entities such as CA and RA may become, from the privacy concerns, a big brother even unintentionally since they can always trace the registered users with regard to the public key certificates. In this paper, we investigate a practical method for privacy protection in the existing PKIs by separating the authorities, one for verifying ownership and the other for validating contents, in a blinded manner. The proposed scheme allows both anonymous and pseudonymous certificates to be issued and used in the existing infrastructures in the way that provides conditional traceability and revocability based on the threshold cryptography and selective credential show by exploiting the extension fields of X.509 certificate version 3.

Original languageEnglish
Title of host publicationInformation Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers
PublisherSpringer Verlag
Pages297-311
Number of pages15
ISBN (Print)9783540710929
DOIs
Publication statusPublished - 2007
Event7th International Workshop on Information Security Applications, WISA 2006 - Jeju Island, Korea, Republic of
Duration: 2006 Aug 282006 Aug 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4298 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Workshop on Information Security Applications, WISA 2006
Country/TerritoryKorea, Republic of
CityJeju Island
Period06/8/2806/8/30

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Privacy protection in PKIs: A separation-of-authority approach'. Together they form a unique fingerprint.

Cite this