TU Darmstadt / ULB / TUbiblio

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents

Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: EuroPKI 2012, September 13-14, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Abstract

We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and the real world of handwritten signatures. In the model, notaries certify that a signer’s certificate is trustworthy to verify a particular signature at a specific time. An end user issues his own X.509 certificate, whose validity period is meaningless and whose trustworthiness is accepted only if the certificate was certified by a notary. After the certification, the certificate remains trustworthy even if later keys are compromised or notaries disappear. The benefits for signed document users are: i) the maintenance of a document signature is simple and only necessary to prevent the obsolescence of cryptographic algorithms; ii) the overhead to store and verify a document signature does not increase significantly in the long term; and iii) there is only one trust decision when verifying a document signature.

Item Type: Conference or Workshop Item
Erschienen: 2012
Editors: De Capitani di Vimercati, Sabrina and Mitchell, Chris
Creators: Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
Title: The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Language: ["languages_typename_1" not defined]
Abstract:

We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and the real world of handwritten signatures. In the model, notaries certify that a signer’s certificate is trustworthy to verify a particular signature at a specific time. An end user issues his own X.509 certificate, whose validity period is meaningless and whose trustworthiness is accepted only if the certificate was certified by a notary. After the certification, the certificate remains trustworthy even if later keys are compromised or notaries disappear. The benefits for signed document users are: i) the maintenance of a document signature is simple and only necessary to prevent the obsolescence of cryptographic algorithms; ii) the overhead to store and verify a document signature does not increase significantly in the long term; and iii) there is only one trust decision when verifying a document signature.

Title of Book: EuroPKI 2012, September 13-14
Series Name: LNCS
Number: 7868
Publisher: Springer
ISBN: 978-3-642-40011-7
Uncontrolled Keywords: Security, Usability and Society;Secure Data
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
20 Department of Computer Science > SECUSO - Security, Usability and Society
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Location: Pisa, Italy
Date Deposited: 04 Aug 2016 15:08
Identification Number: TUD-CS-2012-0156
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item