Académique Documents
Professionnel Documents
Culture Documents
Key Management
Group management
Authorization management
Authentication Using Public-Key
Cryptography
1 KB+(A, RA)
2 KA+(RA, RB,KA,B)
Alice
Bob
3 KA,B(RB)
How?
- CA generates KCA-(E, KE+)
- Everyone can verify signature using KCA+
Certification Authority (CA)
Root CA
CA-1 CA-2
Registration Authority
private key
Alice
private key
Bob
Certificate Revocation
Bob picks a
symmetric key and
encrypts it using
Alice’s public key
Key Management
Group management
Authorization management
Secure Group Management
Process in group G
New process
group admittance
Outline
Key Management
Group management
Authorization management
Authorization Management
Capability:
- Unforgeable data structure for a specific resource R
- Specify access right the holder has with respect to R
Owner
- Method B: Alice passes the file name to P and printer P copies the
file F to its spooling directory when F is actually needed.