TU Darmstadt / ULB / TUbiblio

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
Pisa, Italy
Conference or Workshop Item, Bibliographie

Abstract

We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and the real world of handwritten signatures. In the model, notaries certify that a signer’s certificate is trustworthy to verify a particular signature at a specific time. An end user issues his own X.509 certificate, whose validity period is meaningless and whose trustworthiness is accepted only if the certificate was certified by a notary. After the certification, the certificate remains trustworthy even if later keys are compromised or notaries disappear. The benefits for signed document users are: i) the maintenance of a document signature is simple and only necessary to prevent the obsolescence of cryptographic algorithms; ii) the overhead to store and verify a document signature does not increase significantly in the long term; and iii) there is only one trust decision when verifying a document signature.

Item Type: Conference or Workshop Item
Erschienen: 2012
Editors: De Capitani di Vimercati, Sabrina ; Mitchell, Chris
Creators: Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
Type of entry: Bibliographie
Title: The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Language: English
Date: September 2012
Publisher: Springer
Issue Number: 7868
Book Title: EuroPKI 2012, September 13-14
Series: LNCS
Event Location: Pisa, Italy
Abstract:

We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.509 and the real world of handwritten signatures. In the model, notaries certify that a signer’s certificate is trustworthy to verify a particular signature at a specific time. An end user issues his own X.509 certificate, whose validity period is meaningless and whose trustworthiness is accepted only if the certificate was certified by a notary. After the certification, the certificate remains trustworthy even if later keys are compromised or notaries disappear. The benefits for signed document users are: i) the maintenance of a document signature is simple and only necessary to prevent the obsolescence of cryptographic algorithms; ii) the overhead to store and verify a document signature does not increase significantly in the long term; and iii) there is only one trust decision when verifying a document signature.

Uncontrolled Keywords: Security, Usability and Society;Secure Data
Identification Number: TUD-CS-2012-0156
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
20 Department of Computer Science > SECUSO - Security, Usability and Society
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Date Deposited: 04 Aug 2016 15:08
Last Modified: 12 Jan 2019 21:21
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details