By Topic

Public-Key-Infrastructure Based on a Peer-to-Peer Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
T. Wolfl ; University of Regensburg

The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of asymmetric cryptographic methods. A widespread PKI has to handle an enormous number of queries for cryptographic certificates which attest the authenticity of public keys. For certain use cases a decentralized organization of the PKI is advantageously. Therefore the author developed a specialized Peer-to-Peer-PKI realizing efficient search and transfer of certificates and trust-recommendations. It is based on a combination of a logic calculus model for PKIs and a scalable Peer-to-Peer lookup protocol. This distributed approach offers advantages in comparison to hierarchical or centralized systems in terms of fault resistance, load distribution, self administration and independence of an operating organization.

Published in:

Proceedings of the 38th Annual Hawaii International Conference on System Sciences

Date of Conference:

03-06 Jan. 2005