Visible to the public PKI Mesh Trust Model Based on Trusted Computing

TitlePKI Mesh Trust Model Based on Trusted Computing
Publication TypeConference Paper
Year of Publication2008
AuthorsLiu, C., Feng, Y., Fan, M., Wang, G.
Conference Name2008 The 9th International Conference for Young Computer Scientists
PublisherIEEE
ISBN Number978-0-7695-3398-8
Keywordsauthentication, Bridges, certificate path processing, certification, certification authorities, certification path processing, computational complexity, Computer science, computer security, Electric breakdown, Human Behavior, human factors, Mesh networks, Metrics, PKI mesh trust model, PKI Trust Models, pubcrawl, Public key, public key cryptography, public key infrastructure, public-key infrastructure, Resiliency, Robustness, Scalability, trust model, Trusted Computing, Trusted Platform Module
Abstract

Different organizations or countries maybe adopt different PKI trust model in real applications. On a large scale, all certification authorities (CA) and end entities construct a huge mesh network. PKI trust model exhibits unstructured mesh network as a whole. However, mesh trust model worsens computational complexity in certification path processing when the number of PKI domains increases. This paper proposes an enhanced mesh trust model for PKI. Keys generation and signature are fulfilled in Trusted Platform Module (TPM) for higher security level. An algorithm is suggested to improve the performance of certification path processing in this model. This trust model is less complex but more efficient and robust than the existing PKI trust models.

URLhttps://ieeexplore.ieee.org/document/4709178
DOI10.1109/ICYCS.2008.384
Citation Keyliu_pki_2008