Reasoning about public-key certification: on bindings between entities and public keys
- 1 April 2000
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 18 (4) , 551-560
- https://doi.org/10.1109/49.839931
Abstract
Public-key certification is of crucial importance for advancing the global information infrastructure, yet it suffers from certain ambiguities and lack of understanding and precision. This paper suggests a few steps toward basing public-key certification and public-key infrastructures on firmer theoretical key. In particular, we investigate the notion of binding a public to an entity. We propose a calculus for deriving conclusions from a given entity Alice's (for instance, a judge's) view consisting of evidence and inference rules valid in Alice's world. The evidence consists of statements made by public keys (e.g., certificates, authorizations, or recommendations), statements made physically toward Alice by other entities, and trust assumptions. Conclusions are about who says a statement, who owns or is committed to a public key, and who transfers a right or authorization to another entity, and are derived by applying the inference rules.Keywords
This publication has 18 references indexed in Scilit:
- A logical language for specifying cryptographic protocol requirementsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Trust relationships in secure systems-a distributed authentication perspectivePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On certificate revocation and validationPublished by Springer Nature ,1998
- Compliance checking in the PolicyMaker trust management systemPublished by Springer Nature ,1998
- Certificate revocation: Mechanics and meaningPublished by Springer Nature ,1998
- Merging and extending the PGP and PEM trust models-the ICE-TEL trust modelIEEE Network, 1997
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- A logic for reasoning about securityACM Transactions on Computer Systems, 1992
- What can we do about the unnecessary diversity of notation for syntactic definitions?Communications of the ACM, 1977