Leak in trusted root certificates management and the method for solving
The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted roo...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2005-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74668587/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted root certificates management tree based on binary signature tree was presented, and the forming of trusted root certificates management tree and the algorithm of trusted root certificates verification were given. Thus, the trusted root certificates management tree not only keeps the trusted root certificates from being replaced, but also have little size and light computing. |
---|---|
ISSN: | 1000-436X |