5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

Efficient User Revocation for Privacy-aware PKI

Download545 downloads
  • @INPROCEEDINGS{10.4108/ICST.QSHINE2008.3824,
        author={Wei Ren and Kui Ren and Wenjing Lou and Yanchao Zhang},
        title={Efficient User Revocation for Privacy-aware PKI},
        proceedings={5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={ICST},
        proceedings_a={QSHINE},
        year={2010},
        month={5},
        keywords={Security Privacy PKI User Revocation},
        doi={10.4108/ICST.QSHINE2008.3824}
    }
    
  • Wei Ren
    Kui Ren
    Wenjing Lou
    Yanchao Zhang
    Year: 2010
    Efficient User Revocation for Privacy-aware PKI
    QSHINE
    ICST
    DOI: 10.4108/ICST.QSHINE2008.3824
Wei Ren1,*, Kui Ren1,*, Wenjing Lou2,*, Yanchao Zhang3,*
  • 1: Dept. of ECE Illinois Institute of Technology
  • 2: Dept. of ECE Worcester Polytechnic Institute
  • 3: Dept. of ECE New Jersey Institute of Technology
*Contact email: wren@ece.iit.edu, kren@ece.iit.edu, wjlou@ece.wpi.edu, yczhang@njit.edu

Abstract

Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applications. To justify the applicability of privacy-aware PKI and optimize the performance, it is highly important to ensure the efficiency of handling user revocations. In practice, user revocation can be due to various predictable and unpredictable reasons, e.g., subscription expiration, network access policy violation, group changing, secret key exposure, etc. Both predictable and unpredictable reasons can happen concurrently, which makes the design of efficient user revocation mechanism challenging. In this paper, we study how to achieve optimized user revocation cost with respect to various revocation approaches. We also propose an advanced scheme Delta-RL that ensures an optimized overall performance in terms of communication, computation and storage, as justified by the extensive analysis.