PKI Mesh Trust Model Based on Trusted Computing
Title | PKI Mesh Trust Model Based on Trusted Computing |
Publication Type | Conference Paper |
Year of Publication | 2008 |
Authors | Liu, C., Feng, Y., Fan, M., Wang, G. |
Conference Name | 2008 The 9th International Conference for Young Computer Scientists |
Publisher | IEEE |
ISBN Number | 978-0-7695-3398-8 |
Keywords | authentication, Bridges, certificate path processing, certification, certification authorities, certification path processing, computational complexity, Computer science, computer security, Electric breakdown, Human Behavior, human factors, Mesh networks, Metrics, PKI mesh trust model, PKI Trust Models, pubcrawl, Public key, public key cryptography, public key infrastructure, public-key infrastructure, Resiliency, Robustness, Scalability, trust model, Trusted Computing, Trusted Platform Module |
Abstract | Different organizations or countries maybe adopt different PKI trust model in real applications. On a large scale, all certification authorities (CA) and end entities construct a huge mesh network. PKI trust model exhibits unstructured mesh network as a whole. However, mesh trust model worsens computational complexity in certification path processing when the number of PKI domains increases. This paper proposes an enhanced mesh trust model for PKI. Keys generation and signature are fulfilled in Trusted Platform Module (TPM) for higher security level. An algorithm is suggested to improve the performance of certification path processing in this model. This trust model is less complex but more efficient and robust than the existing PKI trust models. |
URL | https://ieeexplore.ieee.org/document/4709178 |
DOI | 10.1109/ICYCS.2008.384 |
Citation Key | liu_pki_2008 |
- Metrics
- Trusted Platform Module
- Trusted Computing
- trust model
- Scalability
- Robustness
- Resiliency
- public-key infrastructure
- public key infrastructure
- public key cryptography
- Public key
- pubcrawl
- PKI Trust Models
- PKI mesh trust model
- authentication
- Mesh networks
- Human Factors
- Human behavior
- Electric breakdown
- computer security
- computer science
- computational complexity
- certification path processing
- certification authorities
- certification
- certificate path processing
- Bridges