NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. International Journal of Information Security
  2. International Journal of Information Security : Volume 8
  3. International Journal of Information Security : Volume 8, Issue 1, February 2009
  4. Privacy-preserving revocation checking
Loading...

Please wait, while we are loading the content...

International Journal of Information Security : Volume 16
International Journal of Information Security : Volume 15
International Journal of Information Security : Volume 14
International Journal of Information Security : Volume 13
International Journal of Information Security : Volume 12
International Journal of Information Security : Volume 11
International Journal of Information Security : Volume 10
International Journal of Information Security : Volume 9
International Journal of Information Security : Volume 8
International Journal of Information Security : Volume 8, Issue 6, December 2009
International Journal of Information Security : Volume 8, Issue 5, October 2009
International Journal of Information Security : Volume 8, Issue 4, August 2009
International Journal of Information Security : Volume 8, Issue 3, June 2009
International Journal of Information Security : Volume 8, Issue 2, April 2009
International Journal of Information Security : Volume 8, Issue 1, February 2009
Related-key rectangle attack on 36 rounds of the XTEA block cipher
Bipartite modular multiplication with twice the bit-length of multipliers
Large-scale network intrusion detection based on distributed learning algorithm
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions
Privacy-preserving revocation checking
International Journal of Information Security : Volume 7
International Journal of Information Security : Volume 6
International Journal of Information Security : Volume 5
International Journal of Information Security : Volume 4
International Journal of Information Security : Volume 3
International Journal of Information Security : Volume 2
International Journal of Information Security : Volume 1

Similar Documents

...
Privacy-preserving authentication of trees and graphs

Article

...
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

Article

...
Certificate revocation system implementation based on the Merkle hash tree

Article

...
Resolving privacy-preserving relationships over outsourced encrypted data storages

Article

...
Delay-sensitive approaches for anonymizing numerical streaming data

Article

...
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Article

...
BlindIdM: A privacy-preserving approach for identity management as a service

Article

...
A practical privacy-preserving targeted advertising scheme for IPTV users

Article

...
Double-trapdoor anonymous tags for traceable signatures

Article

Privacy-preserving revocation checking

Content Provider SpringerLink
Author Narasimha, M. Solis, J. Tsudik, G.
Copyright Year 2008
Abstract Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert the validity of another party’s certificate, it performs a certificate revocation check. There are several revocation techniques varying in both the operational model and underlying data structures. One common feature is that a client typically contacts some third party (whether trusted, untrusted or semi-trusted) and obtains some evidence of either revocation or validity (non-revocation) for the certificate in question. While useful, revocation checking can leak sensitive information. In particular, third parties of dubious trustworthiness can discover the identity of the party performing the revocation check, as well as the target of the check. The former can be easily remedied with techniques such as onion routing or anonymous web browsing. Whereas, hiding the target of the query is not obvious. This paper focuses on the privacy in revocation checking, explores the loss of privacy in current revocation checking techniques and proposes simple and efficient privacy-preserving techniques for two well-known revocation methods.
Starting Page 61
Ending Page 75
Page Count 15
File Format PDF
ISSN 16155262
Journal International Journal of Information Security
Volume Number 8
Issue Number 1
e-ISSN 16155270
Language English
Publisher Springer-Verlag
Publisher Date 2008-09-16
Publisher Place Berlin, Heidelberg
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword Anonymity and privacy Revocation Certificate revocation lists Certificate revocation trees Communications Engineering, Networks Management of Computing and Information Systems Coding and Information Theory Operating Systems Computer Communication Networks Data Encryption
Content Type Text
Resource Type Article
Subject Computer Networks and Communications Information Systems Safety, Risk, Reliability and Quality Software
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...