Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Authentication of users in an automated business transaction is commonly realized by means of a Public Key Infrastructure(PKI). A PKI is a framework on which the security services are built. Each user or end entity is given a digitally signed data structure called digital certificate. Peer-to- Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since there are multiple paths between users and the certification path is bidirectional. In this paper, we propose a novel method to convert a peer-to-peer PKI to a Depth First Search(DFS) spanning tree to simplify the certificate path verification by avoiding multiple paths between users, since the DFS spanning tree equivalent of peer-to-peer PKI contains only one path between any two Certification Authorities.

Original languageEnglish
Title of host publicationAdvances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings
Pages158-167
Number of pages10
Volume131 CCIS
EditionPART 1
DOIs
Publication statusPublished - 2011
Event1st International Conference on Computer Science and Information Technology, CCSIT 2011 - Bangalore, India
Duration: 02-01-201104-01-2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume131 CCIS
ISSN (Print)1865-0929

Conference

Conference1st International Conference on Computer Science and Information Technology, CCSIT 2011
CountryIndia
CityBangalore
Period02-01-1104-01-11

Fingerprint

Authentication
Data structures
Industry

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Balachandra, Rao, A., & Prema, K. V. (2011). Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree. In Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings (PART 1 ed., Vol. 131 CCIS, pp. 158-167). (Communications in Computer and Information Science; Vol. 131 CCIS, No. PART 1). https://doi.org/10.1007/978-3-642-17857-3_16
Balachandra ; Rao, Ajay ; Prema, K. V. / Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree. Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. Vol. 131 CCIS PART 1. ed. 2011. pp. 158-167 (Communications in Computer and Information Science; PART 1).
@inproceedings{c9259c185afe4713b5da627875911dba,
title = "Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree",
abstract = "Authentication of users in an automated business transaction is commonly realized by means of a Public Key Infrastructure(PKI). A PKI is a framework on which the security services are built. Each user or end entity is given a digitally signed data structure called digital certificate. Peer-to- Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since there are multiple paths between users and the certification path is bidirectional. In this paper, we propose a novel method to convert a peer-to-peer PKI to a Depth First Search(DFS) spanning tree to simplify the certificate path verification by avoiding multiple paths between users, since the DFS spanning tree equivalent of peer-to-peer PKI contains only one path between any two Certification Authorities.",
author = "Balachandra and Ajay Rao and Prema, {K. V.}",
year = "2011",
doi = "10.1007/978-3-642-17857-3_16",
language = "English",
isbn = "9783642178566",
volume = "131 CCIS",
series = "Communications in Computer and Information Science",
number = "PART 1",
pages = "158--167",
booktitle = "Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings",
edition = "PART 1",

}

Balachandra, Rao, A & Prema, KV 2011, Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree. in Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 edn, vol. 131 CCIS, Communications in Computer and Information Science, no. PART 1, vol. 131 CCIS, pp. 158-167, 1st International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, 02-01-11. https://doi.org/10.1007/978-3-642-17857-3_16

Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree. / Balachandra; Rao, Ajay; Prema, K. V.

Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. Vol. 131 CCIS PART 1. ed. 2011. p. 158-167 (Communications in Computer and Information Science; Vol. 131 CCIS, No. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree

AU - Balachandra,

AU - Rao, Ajay

AU - Prema, K. V.

PY - 2011

Y1 - 2011

N2 - Authentication of users in an automated business transaction is commonly realized by means of a Public Key Infrastructure(PKI). A PKI is a framework on which the security services are built. Each user or end entity is given a digitally signed data structure called digital certificate. Peer-to- Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since there are multiple paths between users and the certification path is bidirectional. In this paper, we propose a novel method to convert a peer-to-peer PKI to a Depth First Search(DFS) spanning tree to simplify the certificate path verification by avoiding multiple paths between users, since the DFS spanning tree equivalent of peer-to-peer PKI contains only one path between any two Certification Authorities.

AB - Authentication of users in an automated business transaction is commonly realized by means of a Public Key Infrastructure(PKI). A PKI is a framework on which the security services are built. Each user or end entity is given a digitally signed data structure called digital certificate. Peer-to- Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since there are multiple paths between users and the certification path is bidirectional. In this paper, we propose a novel method to convert a peer-to-peer PKI to a Depth First Search(DFS) spanning tree to simplify the certificate path verification by avoiding multiple paths between users, since the DFS spanning tree equivalent of peer-to-peer PKI contains only one path between any two Certification Authorities.

UR - http://www.scopus.com/inward/record.url?scp=84857198800&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84857198800&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-17857-3_16

DO - 10.1007/978-3-642-17857-3_16

M3 - Conference contribution

SN - 9783642178566

VL - 131 CCIS

T3 - Communications in Computer and Information Science

SP - 158

EP - 167

BT - Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings

ER -

Balachandra, Rao A, Prema KV. Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree. In Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. Vol. 131 CCIS. 2011. p. 158-167. (Communications in Computer and Information Science; PART 1). https://doi.org/10.1007/978-3-642-17857-3_16