Leak in trusted root certificates management and the method for solving

The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted roo...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU Guo-dong, NING Hong-zhou, HE De-quan
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2005-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74668587/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537207112826880
author ZHU Guo-dong
NING Hong-zhou
HE De-quan
author_facet ZHU Guo-dong
NING Hong-zhou
HE De-quan
author_sort ZHU Guo-dong
collection DOAJ
description The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted root certificates management tree based on binary signature tree was presented, and the forming of trusted root certificates management tree and the algorithm of trusted root certificates verification were given. Thus, the trusted root certificates management tree not only keeps the trusted root certificates from being replaced, but also have little size and light computing.
format Article
id doaj-art-9804adcd1905474284e10330f2d48115
institution Kabale University
issn 1000-436X
language zho
publishDate 2005-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9804adcd1905474284e10330f2d481152025-01-14T08:42:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2005-01-0110010474668587Leak in trusted root certificates management and the method for solvingZHU Guo-dongNING Hong-zhouHE De-quanThe certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted root certificates management tree based on binary signature tree was presented, and the forming of trusted root certificates management tree and the algorithm of trusted root certificates verification were given. Thus, the trusted root certificates management tree not only keeps the trusted root certificates from being replaced, but also have little size and light computing.http://www.joconline.com.cn/zh/article/74668587/trusted root certificatescertificates managementcertificates replacementtrusted root certificates management tree
spellingShingle ZHU Guo-dong
NING Hong-zhou
HE De-quan
Leak in trusted root certificates management and the method for solving
Tongxin xuebao
trusted root certificates
certificates management
certificates replacement
trusted root certificates management tree
title Leak in trusted root certificates management and the method for solving
title_full Leak in trusted root certificates management and the method for solving
title_fullStr Leak in trusted root certificates management and the method for solving
title_full_unstemmed Leak in trusted root certificates management and the method for solving
title_short Leak in trusted root certificates management and the method for solving
title_sort leak in trusted root certificates management and the method for solving
topic trusted root certificates
certificates management
certificates replacement
trusted root certificates management tree
url http://www.joconline.com.cn/zh/article/74668587/
work_keys_str_mv AT zhuguodong leakintrustedrootcertificatesmanagementandthemethodforsolving
AT ninghongzhou leakintrustedrootcertificatesmanagementandthemethodforsolving
AT hedequan leakintrustedrootcertificatesmanagementandthemethodforsolving