论文部分内容阅读
Grid security infrastructure (GSI) pro-vides the security in grids by using proxy certificates to delegate the work of authentication. At present, revoca-tion proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short pe-riod of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
At present, revoca-tion proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other However, when a lot of certifications are revoked, CRL will be the burden of the system. this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous, two schemes have to wait the expiration of the certificate. previous methods.