Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Authentication of users in an automated business transaction is commonly realized by means of a Public Key Infrastructure(PKI). A PKI is a framework on which the security services are built. Each user or end entity is given a digitally signed data structure called digital certificate. Peer-to- Peer(also called Mesh PKI) architecture is one of the most popular PKI trust models that is widely used in automated business transactions, but certificate path verification is very complex since there are multiple paths between users and the certification path is bidirectional. In this paper, we propose a novel method to convert a peer-to-peer PKI to a Depth First Search(DFS) spanning tree to simplify the certificate path verification by avoiding multiple paths between users, since the DFS spanning tree equivalent of peer-to-peer PKI contains only one path between any two Certification Authorities.

Original languageEnglish
Title of host publicationAdvances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings
Pages158-167
Number of pages10
Volume131 CCIS
EditionPART 1
DOIs
Publication statusPublished - 2011
Event1st International Conference on Computer Science and Information Technology, CCSIT 2011 - Bangalore, India
Duration: 02-01-201104-01-2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume131 CCIS
ISSN (Print)1865-0929

Conference

Conference1st International Conference on Computer Science and Information Technology, CCSIT 2011
Country/TerritoryIndia
CityBangalore
Period02-01-1104-01-11

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree'. Together they form a unique fingerprint.

Cite this