Efficient user revocation for privacy-aware PKI

Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.

Original languageEnglish (US)
Title of host publicationQShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
EditorsJiannong Cao, Lionel Ni
PublisherICST
ISBN (Electronic)9789639799264
DOIs
StatePublished - Jan 1 2008
Event5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008 - Hong Kong, Hong Kong
Duration: Jul 28 2008Jul 31 2008

Publication series

NameQShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Other

Other5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008
CountryHong Kong
CityHong Kong
Period7/28/087/31/08

Keywords

  • PKI
  • Privacy
  • Security
  • User revocation

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Efficient user revocation for privacy-aware PKI'. Together they form a unique fingerprint.

  • Cite this

    Ren, W., Ren, K., Lou, W., & Zhang, Y. (2008). Efficient user revocation for privacy-aware PKI. In J. Cao, & L. Ni (Eds.), QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness). ICST. https://doi.org/10.4108/ICST.QSHINE2008.3824