跳至主要内容

Public Key Infrastructure: A Survey

Read  full  paper  at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=52982#.VK8z8MnQrzE

ABSTRACT
As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.
 
Cite this paper
Albarqi, A. , Alzaid, E. , Ghamdi, F. , Asiri, S. and Kar, J. (2015) Public Key Infrastructure: A Survey. Journal of Information Security, 6, 31-37. doi: 10.4236/jis.2015.61004.
 
References
[1]Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22, 644-654.
 
[2]Kohnfelder, L.M. (1978) Towards a Practical Public Key Cryptosystem. MIT S.B. Thesis, Massachusetts Institute of Technology, Cambridge.
 
[3]ITU-T (1993) The Directory—Overview of Concepts, Models and Service. X.500 Series of Recommen- dations, International Telecommunications Union, Geneva.
 
[4]Ford, W. (1998) Public Key Infrastructure Interoperation. IEEE Aerospace Conference, 21-28 March 1998, Snowmass at Aspen, Vol. 4, 329-333.
 
[5]Chokhani, S. (1994) Toward a National Public Key Infrastructure. IEEE Communications Magazine, 32, 70-74.
 
[6]Wang, K.F. and Zhang, Z.H. (2010) Design and Implementation of a Safe Public Key Infrastructure. International Conference on Future Information Technology and Management Engineering (FITME), Changzhou, 9-10 October 2010, 298-301.
 
[7]Fongen, A. (2010) Optimization of a Public Key Infrastructure. Military Communications Conference (MILCOM), Baltimore, 7-10 November 2011, 1440-1447.
 
[8]Wing, P. and O’higgins, B. (1999) Using Public Key Infrastructures for Security and Risk Management. IEEE Communications Magazine, 37, 71-73.
 
[9]Polk, W., Hastings, N. and Malpani, A. (2003) Public Key Infrastructures That Satisfy Security Goals. IEEE Internet Computing, 7, 60-67.
 
[10]Dankers, J., Garefalakis, T., Schaffelhofer, R. and Wright, T. (2002) Public Key Infrastructure in Mobile Systems. IEEE Electronics and Communications Engineering Journal, 14, 180-190.
 
[11]Slagell, A., Bonilla, R. and Yurcik, W. (2006) A Survey of PKI Components and Scalability Issues. 25th IEEE Performance, Computing, and Communications Conference, Phoenix, 10-12 April 2006, 10 p.
 
[12]Vacca, J. (2013) Public Key Infrastructure. In: Cyber Security and IT Infrastructure Protection, Steven Elliot, Waltham, 75-107.
 
[13]Balachandra, M., Krishna, P. and Shashank, S. (2012) Wireless Public Key Infrastructure for Mobile Phones. International Journal of Network Security and Its Applications (IJNSA), 4, 111-118.
 
[14]Toorani, M. and Beheshti, A. (2008) LPKI—A Lightweight Public Key Infrastructure for the Mobile Environments. 11th IEEE International Conference on Communication Systems, Guangzhou, 19-21 November 2008, 162-166.
 
[15]Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
 
[16]Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, 16, 26-36.
 
[17]Kar, J. (2013) ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve. International Journal of Network Security, 15, 347-354.
 
[18]Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.                                  eww150109lx

评论

此博客中的热门博文

A Comparison of Methods Used to Determine the Oleic/Linoleic Acid Ratio in Cultivated Peanut (Arachis hypogaea L.)

Cultivated peanut ( Arachis hypogaea L.) is an important oil and food crop. It is also a cheap source of protein, a good source of essential vitamins and minerals, and a component of many food products. The fatty acid composition of peanuts has become increasingly important with the realization that oleic acid content significantly affects the development of rancidity. And oil content of peanuts significantly affects flavor and shelf-life. Early generation screening of breeding lines for high oleic acid content greatly increases the efficiency of developing new peanut varieties. The objective of this study was to compare the accuracy of methods used to classify individual peanut seed as high oleic or not high oleic. Three hundred and seventy-four (374) seeds, spanning twenty-three (23) genotypes varying in oil composition (i.e. high oleic (H) or normal/not high oleic (NH) inclusive of all four peanut market-types (runner, Spanish, Valencia and Virginia), were individually tested ...

Location Optimization of a Coal Power Plant to Balance Costs against Plant’s Emission Exposure

Fuel and its delivery cost comprise the biggest expense in coal power plant operations. Delivery of electricity from generation to consumers requires investment in power lines and transmission grids. Placing a coal power plant or multiple power plants near dense population centers can lower transmission costs. If a coalmine is nearby, transportation costs can also be reduced. However, emissions from coal plants play a key role in worsening health crises in many countries. And coal upon combustion produces CO 2 , SO 2 , NO x , CO, Metallic and Particle Matter (PM10 & PM2.5). The presence of these chemical compounds in the atmosphere in close vicinity to humans, livestock, and agriculture carries detrimental health consequences. The goal of the research was to develop a methodology to minimize the public’s exposure to harmful emissions from coal power plants while maintaining minimal operational costs related to electric distribution losses and coal logistics. The objective was...

Evaluation of the Safety and Efficacy of Continuous Use of a Home-Use High-Frequency Facial Treatment Appliance

At present, many home-use beauty devices are available in the market. In particular, many products developed for facial treatment use light, e.g., a flash lamp or a light-emitting diode (LED). In this study, the safety of 4 weeks’ continuous use of NEWA TM , a high-frequency facial treatment appliance, every alternate day at home was verified, and its efficacy was evaluated in Japanese individuals with healthy skin aged 30 years or older who complained of sagging of the facial skin.  Transepidermal water loss (TEWL), melanin levels, erythema levels, sebum secretion levels, skin color changes and wrinkle improvement in the facial skin were measured before the appliance began to be used (study baseline), at 2 and 4 weeks after it had begun to be used, and at 2 weeks after completion of the 4-week treatment period (6 weeks from the study baseline). In addition, data obtained by subjective evaluation by the subjects themselves on a visual analog scale (VAS) were also analyzed. Fur...