Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2018, Article ID 7379364, 19 pages
https://doi.org/10.1155/2018/7379364
Research Article

WPKI Certificate Verification Scheme Based on Certificate Digest Signature-Online Certificate Status Protocol

Ke Gu,1,2,3 Na Wu,1 Yongzhi Liu,1 Fei Yu,1 and Bo Yin1

1School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410114, China
2Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha University of Science & Technology, Changsha 410114, China
3School of Information Science and Engineering, Central South University, Changsha 410083, China

Correspondence should be addressed to Ke Gu; moc.361@2754kg

Received 17 May 2017; Revised 26 September 2017; Accepted 1 November 2017; Published 11 February 2018

Academic Editor: Yakov Strelniker

Copyright © 2018 Ke Gu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. OMA, Wireless Application ProtocolCWireless Public Key Infrastructure, WAP-217-WPKI, April 2001.
  2. S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “RFC2560,” Tech. Rep., 2013, https://www.rfc-editor.org/rfc/rfc6960.txt. View at Google Scholar
  3. C. Schwingenschlögl, S. Eichler, and B. Müller-Rathgeber, “Performance of PKI-based security mechanisms in mobile ad hoc networks,” AEÜ - International Journal of Electronics and Communications, vol. 60, no. 1, pp. 20–24, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Critchlow and N. Zhang, “Security enhanced accountable anonymous PKI certificates for mobile e-commerce,” Computer Networks, vol. 45, no. 4, pp. 483–503, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. TU-T Recommendation X.509(1997)-ISO/IEC 9594-8:1998,Information technology-Open Systems Inter-connectionCThe Directory: Authentication Frame work.
  6. OMA, WAP Certificate and CRL, WAP-211-X.509, March 2000.
  7. L. C. Washington, Elliptic Curves Number Theory and Cryptography, Discrete Mathematics and its Applications, Discrete Mathematics and its Applications, Chapman & Hall/CRC, University of Maryland College Park, College Park, MD, USA, 2nd edition, 2008. View at MathSciNet
  8. N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” Designs, Codes and Cryptography. An International Journal, vol. 19, no. 2-3, pp. 173–193, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  9. T. Perlines Hormann, K. Wrona, and S. Holtmanns, “Evaluation of certificate validation mechanisms,” Computer Communications, vol. 29, no. 3, pp. 291–305, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Lee, J. Lee, and J. Song, “Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce,” Computer Communications, vol. 30, no. 4, pp. 893–903, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Park and K. Rhee, “A Framework for Distributed OCSP without Responders Certificate,” in Proceedings of the Workshop on Information Security Applications (WISA 2004), 2004.
  12. J. L. Muñoz, O. Esparza, J. Forné, and E. Pallares, “H-OCSP: A protocol to reduce the processing burden in online certificate status validation,” Electronic Commerce Research, vol. 8, no. 4, pp. 255–273, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Lee, B.-J. Choi, S.-H. Seon, and E.-G. Kim, “Ocsp modification for supporting anonymity and high-speed processing in vehicle communication system,” Lecture Notes in Electrical Engineering, vol. 373, pp. 607–612, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Masdari, S. Jabbehdari, and J. Bagherzadeh, “Improving OCSP-Based Certificate Validations in Wireless Ad Hoc Networks,” Wireless Personal Communications, vol. 82, no. 1, pp. 377–400, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Berbecaru, M. M. Casalino, and A. Lioy, “FcgiOCSP: A scalable OCSP-based certificate validation system exploiting the FastCGI interface,” Software: Practice and Experience, vol. 43, no. 12, pp. 1489–1518, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. F. Amounas, “Security Enhancement in Elliptic Curve Encryption of Amazigh alphabet using Genetic Algorithm,” International journal of Computer Science and Network Solutions, vol. 3, no. 10, pp. 18–27, 2015. View at Google Scholar
  17. J. Iliadis, S. Gritzalis, D. Spinellis, D. De Cock, B. Preneel, and D. Gritzalis, “Towards a framework for evaluating certificate status information mechanisms,” Computer Communications, vol. 26, no. 16, pp. 1839–1850, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. G. F. Marias, K. Papapanagiotou, V. Tsetsos, O. Sekkas, and P. Georgiadis, “Integrating a trust framework with a distributed certificate validation scheme for MANETs,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 78259, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. K. Papapanagiotou, G. F. Marias, and P. Georgiadis, “Revising centralized certificate validation standards for mobile and wireless communications,” Computer Standards & Interfaces, vol. 32, no. 5-6, pp. 281–287, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. D. Kouřil, L. Matyska, and M. Procházka, “A robust and efficient mechanism to distribute certificate revocation information using the Grid Monitoring Architecture,” in Proceedings of the 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07, pp. 614–619, Canada, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (OCSP): IETF RFC2560, IETF NetworkWorking Group,” Tech. Rep., 1999. View at Publisher · View at Google Scholar
  22. R. Housley, W. Ford, W. Polk, and D. Solo, “Internet X.509 Public Key Infrastructure Certificate and CRL Profile[S]. RFC2459.PKIX Working Group,” Tech. Rep., 1999. View at Publisher · View at Google Scholar