Disaster coverable PKI model utilizing the existing PKI structure

Man Kim Bo, Young Choi Kyu, Dong Hoon Lee

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service. Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it. It is significantly important for a CA to ensure its service to continue to operate properly by preparing for any disaster caused by a CA's private key compromise no matter what the cause is. In this paper, we provide the definitions of PKI disaster recovery and PKI business continuity, which are more clear and specific than ever before. We also present three requirements for a PKI model preparing for a disaster. Then we propose a PKI model that ensures business continuity in the event of a disaster in which a CA key is exposed. It is easily applied to the existing PKI structure. We stress that the proposed PKI model in this paper is the first to ensure both applicability to the existing models and business continuity in the event of a disaster.

Original languageEnglish
Pages (from-to)537-545
Number of pages9
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4277 LNCS - I
Publication statusPublished - 2006 Dec 15

Fingerprint

Public Key Infrastructure
Disasters
Disaster
Certification
Certificate
Industry
Model
Recovery
Continue
Requirements

Keywords

  • Business continuity
  • Forward secure signature scheme
  • PKI model
  • Public key infrastructure

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

@article{38d76bf3159d4a7ba1680974d3d6200f,
title = "Disaster coverable PKI model utilizing the existing PKI structure",
abstract = "A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service. Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it. It is significantly important for a CA to ensure its service to continue to operate properly by preparing for any disaster caused by a CA's private key compromise no matter what the cause is. In this paper, we provide the definitions of PKI disaster recovery and PKI business continuity, which are more clear and specific than ever before. We also present three requirements for a PKI model preparing for a disaster. Then we propose a PKI model that ensures business continuity in the event of a disaster in which a CA key is exposed. It is easily applied to the existing PKI structure. We stress that the proposed PKI model in this paper is the first to ensure both applicability to the existing models and business continuity in the event of a disaster.",
keywords = "Business continuity, Forward secure signature scheme, PKI model, Public key infrastructure",
author = "Bo, {Man Kim} and Kyu, {Young Choi} and Lee, {Dong Hoon}",
year = "2006",
month = "12",
day = "15",
language = "English",
volume = "4277 LNCS - I",
pages = "537--545",
journal = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Disaster coverable PKI model utilizing the existing PKI structure

AU - Bo, Man Kim

AU - Kyu, Young Choi

AU - Lee, Dong Hoon

PY - 2006/12/15

Y1 - 2006/12/15

N2 - A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service. Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it. It is significantly important for a CA to ensure its service to continue to operate properly by preparing for any disaster caused by a CA's private key compromise no matter what the cause is. In this paper, we provide the definitions of PKI disaster recovery and PKI business continuity, which are more clear and specific than ever before. We also present three requirements for a PKI model preparing for a disaster. Then we propose a PKI model that ensures business continuity in the event of a disaster in which a CA key is exposed. It is easily applied to the existing PKI structure. We stress that the proposed PKI model in this paper is the first to ensure both applicability to the existing models and business continuity in the event of a disaster.

AB - A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service. Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it. It is significantly important for a CA to ensure its service to continue to operate properly by preparing for any disaster caused by a CA's private key compromise no matter what the cause is. In this paper, we provide the definitions of PKI disaster recovery and PKI business continuity, which are more clear and specific than ever before. We also present three requirements for a PKI model preparing for a disaster. Then we propose a PKI model that ensures business continuity in the event of a disaster in which a CA key is exposed. It is easily applied to the existing PKI structure. We stress that the proposed PKI model in this paper is the first to ensure both applicability to the existing models and business continuity in the event of a disaster.

KW - Business continuity

KW - Forward secure signature scheme

KW - PKI model

KW - Public key infrastructure

UR - http://www.scopus.com/inward/record.url?scp=33845434645&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845434645&partnerID=8YFLogxK

M3 - Article

VL - 4277 LNCS - I

SP - 537

EP - 545

JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SN - 0302-9743

ER -