Efficient user revocation for privacy-aware PKI

Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.

Original languageEnglish (US)
Title of host publicationQShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
PublisherICST
ISBN (Print)9789639799264
DOIs
StatePublished - 2008
Externally publishedYes
Event5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008 - Hong Kong, Hong Kong
Duration: Jul 28 2008Jul 31 2008

Other

Other5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008
CountryHong Kong
CityHong Kong
Period7/28/087/31/08

Fingerprint

Access control
Communication
Costs

Keywords

  • PKI
  • Privacy
  • Security
  • User revocation

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Hardware and Architecture

Cite this

Ren, W., Ren, K., Lou, W., & Zhang, Y. (2008). Efficient user revocation for privacy-aware PKI. In QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness ICST. https://doi.org/10.4108/ICST.QSHINE2008.3824

Efficient user revocation for privacy-aware PKI. / Ren, Wei; Ren, Kui; Lou, Wenjing; Zhang, Yanchao.

QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST, 2008.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ren, W, Ren, K, Lou, W & Zhang, Y 2008, Efficient user revocation for privacy-aware PKI. in QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST, 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008, Hong Kong, Hong Kong, 7/28/08. https://doi.org/10.4108/ICST.QSHINE2008.3824
Ren W, Ren K, Lou W, Zhang Y. Efficient user revocation for privacy-aware PKI. In QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST. 2008 https://doi.org/10.4108/ICST.QSHINE2008.3824
Ren, Wei ; Ren, Kui ; Lou, Wenjing ; Zhang, Yanchao. / Efficient user revocation for privacy-aware PKI. QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST, 2008.
@inproceedings{64ed16673b7541f3ab901de84feefe78,
title = "Efficient user revocation for privacy-aware PKI",
abstract = "Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.",
keywords = "PKI, Privacy, Security, User revocation",
author = "Wei Ren and Kui Ren and Wenjing Lou and Yanchao Zhang",
year = "2008",
doi = "10.4108/ICST.QSHINE2008.3824",
language = "English (US)",
isbn = "9789639799264",
booktitle = "QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness",
publisher = "ICST",

}

TY - GEN

T1 - Efficient user revocation for privacy-aware PKI

AU - Ren, Wei

AU - Ren, Kui

AU - Lou, Wenjing

AU - Zhang, Yanchao

PY - 2008

Y1 - 2008

N2 - Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.

AB - Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.

KW - PKI

KW - Privacy

KW - Security

KW - User revocation

UR - http://www.scopus.com/inward/record.url?scp=84911191578&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84911191578&partnerID=8YFLogxK

U2 - 10.4108/ICST.QSHINE2008.3824

DO - 10.4108/ICST.QSHINE2008.3824

M3 - Conference contribution

AN - SCOPUS:84911191578

SN - 9789639799264

BT - QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

PB - ICST

ER -