1999
DOI: 10.17487/rfc2459
|View full text |Cite
|
Sign up to set email alerts
|

Internet X.509 Public Key Infrastructure Certificate and CRL Profile

Abstract: Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
397
0
14

Year Published

2003
2003
2013
2013

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 661 publications
(411 citation statements)
references
References 12 publications
0
397
0
14
Order By: Relevance
“…Also, certification path verifiers must be able to cope with the topologies that arenot entirely hierarchical. Moreover, compromise of the root private key is catastrophic because every certification path is compromised and recovery requires secure "out-of-band" distribution of the new public key to every user [1][2][3][4].…”
Section: Digital Signatorementioning
confidence: 99%
See 1 more Smart Citation
“…Also, certification path verifiers must be able to cope with the topologies that arenot entirely hierarchical. Moreover, compromise of the root private key is catastrophic because every certification path is compromised and recovery requires secure "out-of-band" distribution of the new public key to every user [1][2][3][4].…”
Section: Digital Signatorementioning
confidence: 99%
“…This problern may complicate user authentication and give vexation to the users. 4 The Proposed Certificate Architecture W e have explained vulnerability of PKI. This section proposes a new digital signature scheme and certificate architecture solving the problem.…”
Section: Certification Pathmentioning
confidence: 99%
“…Proxy cryptography is affected by such delays, and indeed, while the literature already gives several provablysecure schemes enjoying many features and reasonable efficiency, almost nothing of it is actually used in the real world. This is in large part a consequence of the long distance between the requirements of proxy cryptography (e.g., system parameters, cryptographic operations) and the currently used technologies (e.g., PKIX [1], Smart Cards). It is therefore urgent to provide mechanisms that allow delegation of signatures using current standard technologies only.…”
Section: Introductionmentioning
confidence: 99%
“…Recipients of a certificate can thus verify whether an authority is part of a specific hierarchy but also whether the policy used by the authority satisfies their requirements. This is possible in so-called policy-based PKIs [13], but the policies included in certificates are still decided by the authorities, not the users.…”
Section: Introductionmentioning
confidence: 99%