Certifying trust

Ilari Lehti, Pekka Nikander

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Abstract

A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates. In this paper, we study the trust relationships expressed by the certificates used in X.509, PGP and SPKI. Especially, we present and revise the idea of a certificate loop, or a loop of certificates from the verifying party to the communicating peer, requesting access or acceptance. We also show how that kind of certificate loops can be used to explicitly express security policy decisions. In the end of the paper, we briefly describe our own SPKI implementation that is specially tailored towards policy management. The implementation is based on Java and build using Design Patterns. It functions as a separate process, providing security services to the local kernel and applications.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings
PublisherSpringer
Pages84-98
Number of pages15
ISBN (Print)3540646930, 9783540646938
DOIs
Publication statusPublished - 1 Jan 1998
MoE publication typeA4 Conference publication
EventInternational Workshop on Practice and Theory in Public Key Cryptography - Pacifico Yokohama, Japan
Duration: 5 Feb 19986 Feb 1998
Conference number: 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1431
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

WorkshopInternational Workshop on Practice and Theory in Public Key Cryptography
Abbreviated titlePKC
Country/TerritoryJapan
CityPacifico Yokohama
Period05/02/199806/02/1998

Fingerprint

Dive into the research topics of 'Certifying trust'. Together they form a unique fingerprint.

Cite this