Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Public key superstructure: "It’s PKI Jim, but not as we know it!"
Wilson S.  Identity and trust on the Internet (Proceedings of the 7th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryland, Mar 4-6, 2008)72-88.2008.Type:Proceedings
Date Reviewed: Sep 2 2008

Why is it so hard to make global public key infrastructure (PKI) work? Not only does Wilson excellently question the misleading assumptions pertaining to the apparent failure of universal open PKI, but he also lucidly presents a viable evolution path of closed PKI schemes toward purpose-oriented international PKI “superstructures.”

Starting with the issue of how PKI actually became so difficult, the paper correctly identifies the “passport” metaphor--that is, the idea that a X.509 certificate represents a globally unique identity--as the most likely culprit. Based on this supposition, PKI proponents have needlessly complicated technical, procedural, and legal ramifications in the typical context of one stranger doing business, over the Internet, with another complete stranger.

However, most, if not all, business is conducted in a rich context, with decidedly less stringent requirements for identity vetting, permitting multiple identities for different purposes. This is demonstrated by the success of closed PKI schemes. With this in mind, the paper argues to reframe digital certificates as “relationship certificates,” representing no longer a unique identity but merely membership in a certain community. The purpose of these relationship certificates, then, is to aid straight-through-processing within the context of that community; for example, doctors filling prescriptions and listed companies submitting official information to the stock exchange, supplemented by a separation of certification agency and registration agency--the latter being simply enacted by the respective administration of the community in question--that could result in a wholesale production of (registration) certificates, further fueling this “PKI superstructure.” In this vein, “cross certification” and “certificate interoperability” are reinterpreted as signifying membership in a particular PKI scheme, and trusting the auditors that have established such a membership.

The ideas of the paper are easily accessible even to nonspecialists due to an excellent and thorough introduction to PKI, coupled with a lively, entertaining writing style that always remains technically accurate.

Reviewer:  Christoph F. Strnadl Review #: CR136013 (0910-0950)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Authentication (D.4.6 ... )
 
 
Authentication (K.6.5 ... )
 
 
Public Key Cryptosystems (E.3 ... )
 
 
Security (K.4.4 ... )
 
 
Electronic Commerce (K.4.4 )
 
 
Security and Protection (K.6.5 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy