Share This Article:

Public Key Infrastructure: A Survey

Full-Text HTML XML Download Download as PDF (Size:2684KB) PP. 31-37
DOI: 10.4236/jis.2015.61004    2,877 Downloads   3,673 Views   Citations

ABSTRACT

As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.

Cite this paper

Albarqi, A. , Alzaid, E. , Ghamdi, F. , Asiri, S. and Kar, J. (2015) Public Key Infrastructure: A Survey. Journal of Information Security, 6, 31-37. doi: 10.4236/jis.2015.61004.

References

[1] Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22, 644-654.
[2] Kohnfelder, L.M. (1978) Towards a Practical Public Key Cryptosystem. MIT S.B. Thesis, Massachusetts Institute of Technology, Cambridge.
[3] ITU-T (1993) The Directory—Overview of Concepts, Models and Service. X.500 Series of Recommen- dations, International Telecommunications Union, Geneva.
[4] Ford, W. (1998) Public Key Infrastructure Interoperation. IEEE Aerospace Conference, 21-28 March 1998, Snowmass at Aspen, Vol. 4, 329-333.
[5] Chokhani, S. (1994) Toward a National Public Key Infrastructure. IEEE Communications Magazine, 32, 70-74.
[6] Wang, K.F. and Zhang, Z.H. (2010) Design and Implementation of a Safe Public Key Infrastructure. International Conference on Future Information Technology and Management Engineering (FITME), Changzhou, 9-10 October 2010, 298-301.
[7] Fongen, A. (2010) Optimization of a Public Key Infrastructure. Military Communications Conference (MILCOM), Baltimore, 7-10 November 2011, 1440-1447.
[8] Wing, P. and O’higgins, B. (1999) Using Public Key Infrastructures for Security and Risk Management. IEEE Communications Magazine, 37, 71-73.
[9] Polk, W., Hastings, N. and Malpani, A. (2003) Public Key Infrastructures That Satisfy Security Goals. IEEE Internet Computing, 7, 60-67.
[10] Dankers, J., Garefalakis, T., Schaffelhofer, R. and Wright, T. (2002) Public Key Infrastructure in Mobile Systems. IEEE Electronics and Communications Engineering Journal, 14, 180-190.
[11] Slagell, A., Bonilla, R. and Yurcik, W. (2006) A Survey of PKI Components and Scalability Issues. 25th IEEE Performance, Computing, and Communications Conference, Phoenix, 10-12 April 2006, 10 p.
[12] Vacca, J. (2013) Public Key Infrastructure. In: Cyber Security and IT Infrastructure Protection, Steven Elliot, Waltham, 75-107.
[13] Balachandra, M., Krishna, P. and Shashank, S. (2012) Wireless Public Key Infrastructure for Mobile Phones. International Journal of Network Security and Its Applications (IJNSA), 4, 111-118.
[14] Toorani, M. and Beheshti, A. (2008) LPKI—A Lightweight Public Key Infrastructure for the Mobile Environments. 11th IEEE International Conference on Communication Systems, Guangzhou, 19-21 November 2008, 162-166.
[15] Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
[16] Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, 16, 26-36.
[17] Kar, J. (2013) ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve. International Journal of Network Security, 15, 347-354.
[18] Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.

  
comments powered by Disqus

Copyright © 2017 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.