{"title":"一种延迟承诺方案,用于增强基于公钥证书的协议","authors":"Wu Wen","doi":"10.1109/ENABL.2000.883725","DOIUrl":null,"url":null,"abstract":"Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An \"ex-employee\" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above \"ex-employee\" attack.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A delayed commitment scheme to enhance public key certificate based protocols\",\"authors\":\"Wu Wen\",\"doi\":\"10.1109/ENABL.2000.883725\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An \\\"ex-employee\\\" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above \\\"ex-employee\\\" attack.\",\"PeriodicalId\":435283,\"journal\":{\"name\":\"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)\",\"volume\":\"195 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2000-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENABL.2000.883725\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.2000.883725","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A delayed commitment scheme to enhance public key certificate based protocols
Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An "ex-employee" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above "ex-employee" attack.