{"title":"增强的公开密码匙基础设施","authors":"Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau","doi":"10.1109/ICITCS.2013.6717801","DOIUrl":null,"url":null,"abstract":"In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Enhanced Public Key Infrastructure\",\"authors\":\"Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau\",\"doi\":\"10.1109/ICITCS.2013.6717801\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.\",\"PeriodicalId\":420227,\"journal\":{\"name\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2013.6717801\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.