Practical Revision for Implementing the Distributing Security-Mediated PKI

  • Yang Jong-Phil (Graduate School of Information Science and Electrical Engineering, Kyushu University) ;
  • Shim Mi-Sun (Infosec Technologies Co., Ltd.) ;
  • Rhee Kyung Hyune (Division of Electronic, Computer & Telecommunication Engineering, Pukyong National University)
  • Published : 2005.12.01

Abstract

The SEM approach to PKl offers several advantages, such as immediate revocation of users' signing ability without CRLs and compatibility with the standard RSA. However, it has a weakness against denial of service attack caused by breaking down or being compromised. G. Vanrenen et al. proposed a distributed SEM approach to overcome the weaknesses. However, it does not provide the desirable properties such as instant availability and immunity against denial of service attack, due to inadequate usage of threshold cryptography and proactive secret sharing. In this paper, we point out its structural contradictions and propose a modified version of distributed SEM approach.

Keywords