期刊文献+

CRL增量-过量发布综合模型研究 被引量:10

Research on the Delta and Over-Issued CRL Synthesis Model
下载PDF
导出
摘要 针对当前PKI应用规模的变化,提出了一种新模型:增量-过量发布综合模型。该模型采用将Delta-CRLs的Base CRL过量发布来实现。通过比较表明,该方式既可以减小信任方下载的CRL大小,改善了响应时间,减少时间碎片;又可以降低对Base CRL峰值请求率,从而降低对存储库的峰值带宽和平均负荷。文中同时指出,增量-过量发布综合模型优于传统模型和增量模型,但其发布性能依赖于PKI系统的证书有效期、证书吊销率、Delta CRL的颁发周期和时间跨度。Delta CRL的颁发周期越长,时间跨度越大,证书吊销率越高,证书有效期越短,过量发布Base CRL所带来的性能优化就越小。因此,增量-过量模型适合于在Delta CRL的颁发周期和时间跨度较短、证书吊销率不高、证书有效期较长的大型PKI系统中。 According to the change of application scale of PKI system currently, an improved model: the Delta and over-issued CRL synthesis model is presented, it is realized by that Base CRL of Delta-CRLs is over-issued. Com- pared to other models, the improved model minimizes the size of CRL which can accelerate to response time and time piece, as well as the peak request rate for Base CRL, the peak bandwidth and average loads on CRL repositories. Si- multaneously it is presented in this paper that the improved model is better than traditional model and Delta-CRLs, but the issuance performance of the improved model depends on the rate of certificate revocation, period of certificate validity, time span and issue periods on Delta CRL. Rate of certificate revo-cation is more higher, time span and issue periods on Delta CRL is more longer and period of certificate validity is more shorter, the performance improvement by over-issued Base CRL is more less. So the improved model is fit for the large-scale PKIs whose rate of certificate revo-cation is not high, period of certificate validity is more longer, time span and issue periods on Delta CRL is more shorter.
出处 《计算机科学》 CSCD 北大核心 2005年第4期133-136,139,共5页 Computer Science
基金 国家863计划项目(863-104-03-01)
关键词 证书撤消列表 过量发布 证书吊销率 时间跨度 证书有效期 PKI Certificate revocation list(CRL) Delta-CRLs Over-issued CRL Delta and over-issued CRL Rate of certificate revocation Time span Period of certificate validity PKI
  • 相关文献

参考文献11

  • 1Adams C, Farrell S. RFC2510 Internet X. 509 Public Key Infrastructure Certificate Management Protocols [s]. RFC2510, Internet Engineer TaskForce,March 1999
  • 2Rivest R L. Can we eliminate certificate revocation lists. In:Rafael H, ed. Financial Cryptography. Anguilla, 1998. British West Indies: Springer, 1997.178~ 183
  • 3Hously R, Ford W, Polk W, et al. Internet X. 509 public key infrastructure certificate and CRL profile. IETFRFC2459, 1999.http: //www. ietf. org/rfc/rfc2459. html
  • 4Micali S. Efficient certificate revocation. TechnicalMemory, MIT/LCS/TM-5426,1996. http://www. lcs. mit. edu/pub-lications
  • 5Kocher P. On certificate revocation and validation. In:Hirschfeld,R., ed. Financial Cryptography-FC'98. LNCS1465, Berlin:Springer-Verlag, 1998. 171 ~177
  • 6Moni Naor, Kobbi Nissim. Certificate revocation and certificate update. IEEE Journal on Selected Areasin Communications, 2000,18(1):561~170
  • 7王尚平,张亚玲,王育民.证书吊销的线索二叉排序Hash树解决方案[J].软件学报,2001,12(9):1343-1350. 被引量:14
  • 8Arnes A, Just M, Knapskong S J, et al. Selecting revocation solutions for PKI. Paper Submitted to NORSEC2000, 2000
  • 9Cooper D A. A more efficient use of Delta-CRLs. In:Proc. of the 2000 IEEE Symposium on Security and Privacy,2000. 190~202
  • 10David A C. A Model of Certificate Revoction [C]. In:Proc. 15th Annual,Computer Security Applications Conference, 1999. 256~264

二级参考文献1

  • 1严蔚敏,数据结构,1991年,118页

共引文献13

同被引文献110

引证文献10

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部