Leak in trusted root certificates management and the method for solving

The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted roo...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU Guo-dong, NING Hong-zhou, HE De-quan
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2005-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74668587/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted root certificates management tree based on binary signature tree was presented, and the forming of trusted root certificates management tree and the algorithm of trusted root certificates verification were given. Thus, the trusted root certificates management tree not only keeps the trusted root certificates from being replaced, but also have little size and light computing.
ISSN:1000-436X