Distributing security-mediated PKI revisited

Jong Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


The SEM approach to PKI offers several advantages, such as immediate revocation of users' signing ability without CRLs and compatibility with the standard RSA. However, it has a weakness against denial of service attack caused by breaking down or being compromised. G. Vanrenen et al. proposed a distributed SEM approach to overcome the weakness. However, it does not provide the desirable properties such as instant availability and immunity against denial of service attack, due to inadequate usage of threshold cryptography and proactive secret sharing. In this paper, we point out its structural shortcomings and propose a modified version.

Original languageEnglish
Title of host publicationPublic Key Infrastructure
Subtitle of host publicationThird European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
PublisherSpringer Verlag
Number of pages14
ISBN (Print)3540351515, 9783540351511
Publication statusPublished - 2006
EventThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006 - Turin, Italy
Duration: Jun 19 2006Jun 20 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4043 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherThird European PKI Workshop, Public Key Infrastructure - Theory and Practice, EuroPKI 2006

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Distributing security-mediated PKI revisited'. Together they form a unique fingerprint.

Cite this