Certifying trust

Ilari Lehti, Pekka Nikander

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates. In this paper, we study the trust relationships expressed by the certificates used in X.509, PGP and SPKI. Especially, we present and revise the idea of a certificate loop, or a loop of certificates from the verifying party to the communicating peer, requesting access or acceptance. We also show how that kind of certificate loops can be used to explicitly express security policy decisions. In the end of the paper, we briefly describe our own SPKI implementation that is specially tailored towards policy management. The implementation is based on Java and build using Design Patterns. It functions as a separate process, providing security services to the local kernel and applications.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings
PublisherSpringer Verlag
Pages84-98
Number of pages15
ISBN (Print)3540646930, 9783540646938
DOIs
Publication statusPublished - 1 Jan 1998
MoE publication typeA4 Article in a conference publication
EventInternational Workshop on Practice and Theory in Public Key Cryptography - Pacifico Yokohama, Japan
Duration: 5 Feb 19986 Feb 1998
Conference number: 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1431
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

WorkshopInternational Workshop on Practice and Theory in Public Key Cryptography
Abbreviated titlePKC
CountryJapan
CityPacifico Yokohama
Period05/02/199806/02/1998

Fingerprint Dive into the research topics of 'Certifying trust'. Together they form a unique fingerprint.

  • Cite this

    Lehti, I., & Nikander, P. (1998). Certifying trust. In Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings (pp. 84-98). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1431). Springer Verlag. https://doi.org/10.1007/BFb0054017