TY - GEN
T1 - Privacy protection in PKIs
T2 - 7th International Workshop on Information Security Applications, WISA 2006
AU - Kwon, Taekyoung
AU - Cheon, Jung Hee
AU - Kim, Yongdae
AU - Lee, Jae Il
PY - 2007
Y1 - 2007
N2 - Due to the growing number of privacy infringement problems, there are increasing demands for privacy enhancing techniques on the Internet. In the PKIs, authorized entities such as CA and RA may become, from the privacy concerns, a big brother even unintentionally since they can always trace the registered users with regard to the public key certificates. In this paper, we investigate a practical method for privacy protection in the existing PKIs by separating the authorities, one for verifying ownership and the other for validating contents, in a blinded manner. The proposed scheme allows both anonymous and pseudonymous certificates to be issued and used in the existing infrastructures in the way that provides conditional traceability and revocability based on the threshold cryptography and selective credential show by exploiting the extension fields of X.509 certificate version 3.
AB - Due to the growing number of privacy infringement problems, there are increasing demands for privacy enhancing techniques on the Internet. In the PKIs, authorized entities such as CA and RA may become, from the privacy concerns, a big brother even unintentionally since they can always trace the registered users with regard to the public key certificates. In this paper, we investigate a practical method for privacy protection in the existing PKIs by separating the authorities, one for verifying ownership and the other for validating contents, in a blinded manner. The proposed scheme allows both anonymous and pseudonymous certificates to be issued and used in the existing infrastructures in the way that provides conditional traceability and revocability based on the threshold cryptography and selective credential show by exploiting the extension fields of X.509 certificate version 3.
UR - http://www.scopus.com/inward/record.url?scp=38049165166&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049165166&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-71093-6_23
DO - 10.1007/978-3-540-71093-6_23
M3 - Conference contribution
AN - SCOPUS:38049165166
SN - 9783540710929
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 297
EP - 311
BT - Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers
PB - Springer Verlag
Y2 - 28 August 2006 through 30 August 2006
ER -