Translator Disclaimer
3 December 2015 Design and implementation of PKI-based certification authority
Author Affiliations +
Proceedings Volume 9794, Sixth International Conference on Electronics and Information Engineering; 979437 (2015) https://doi.org/10.1117/12.2203236
Event: Sixth International Conference on Electronics and Information Engineering, 2015, Dalian, China
Abstract
PKI achieves the management of public key by certificates. It combines the user’s public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user’s identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ying Zheng, Qinghai Bai, Linna Zhao, Hua Chun, and Jing Chen "Design and implementation of PKI-based certification authority", Proc. SPIE 9794, Sixth International Conference on Electronics and Information Engineering, 979437 (3 December 2015); https://doi.org/10.1117/12.2203236
PROCEEDINGS
5 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

Private escrow key management: a method and its issues
Proceedings of SPIE (March 12 1996)
Access and accounting schemes of wireless broadband
Proceedings of SPIE (April 28 2004)
Research of UMTS core network firewall base on IXP1200
Proceedings of SPIE (February 20 2006)
Internet-based secure virtual networks
Proceedings of SPIE (September 16 1998)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top