A Compatible Public Service Platform for Multi-Electronic Certification Authority

Article Preview

Abstract:

Electronic certification authority (CA) application has problem in compatibility. The validation between some certification authorities is indispensable. In this paper, special qualities of some overlapped authentication models are analyzed based on the operation application. Also, an electronic authentication public service platform has been designed for compatible application of Multi-CA. The platform is both efficient, and convenient.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

579-583

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] YAN Hai-long, YU Jian-ping, HU Qiang, et al., A Trusted Third Party Inter-Domain Authentication Model Based on Trust Lists. Signal Processing. 2012, 28(9): 1278-1283.

Google Scholar

[2] SHEN Jie, JANG Cao-hui. A Realization and Implementation of Cross-Certified Based on SOA. Journal of Guizhou University (Natural Science), 2010, 27(1): 80-85.

Google Scholar

[3] Su Bing, Lv Fang-fang, You Jing, et al., Analysis and research on network trust models based on multi-CA [J]. Second International Conference on Information Technology and Computer Science, 2010: 390-393.

DOI: 10.1109/itcs.2010.101

Google Scholar

[4] ZHU Peng-fei, DAI Ying-xia, BAO Xu-hua. A distributed trust model with high-compatibility based of bridge CA [J]. Journal of Software, 2006, 17(8): 1818-1823.

DOI: 10.1360/jos171818

Google Scholar

[5] PENG Hua-Xi. An Identity2Based Authentication Model for Multi2Domain. CHINESE JOURNAL OF COMPU TERS, 2006, 29(8): 1271-1281.

Google Scholar

[6] Helena Rif-Pous, Jordi Herrera-Joancomarti. An Interdomain PKI Model Based on Trust Lists. EuroPKI 2007, LNCS 4582, 2007: 49-64.

DOI: 10.1007/978-3-540-73408-6_4

Google Scholar

[7] LIU Yan, XI Jing, LU Jian-de. Proxy of Certificate Validation Based on Hybrid Trust Model. Computer engineering, 2008, 34(1): 170-172.

Google Scholar

[8] YANG Xuan-yuan, LU Jian-de, LIU Yan. The Research on Cross- certification Based on Path Sear ching Using Weighted Trust List. Microelectronics & Computer, 2006, 23(10): 165-172.

Google Scholar

[9] ZHOU Jing-quan, ZHANG Shun-yi, LI Ming. A method for authentication using multiple certificate paths. Journal on Communications, 2005, 26(1): 125-129.

Google Scholar

[10] Li Peng Zhang Changhong Zhou Libing. Research on PKI Trust Model Based on Cross Certification, Computer & Digital Engineering, 2010, 38(12): 100-103.

Google Scholar

[11] NASH A. Public Key Infrastructure: Implementing and managing electronic security [M]. (2002).

Google Scholar

[12] Mohan Atreya. Benjamin Hammond. Digital Signatures [M]. US: McGraw-Hill Companies, (2002).

Google Scholar

[13] Shi Weimin. Researches and Application on PKI and IBE Key Technology [D]. Beijing University of posts and telecommunications Ph.D. Thesis, (2006).

Google Scholar