Public Key Infrastructure

5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

  • Editors
  • Stig F. Mjølsnes
  • Sjouke Mauw
  • Sokratis K. Katsikas
Conference proceedings EuroPKI 2008

DOI: 10.1007/978-3-540-69485-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5057)

Table of contents (16 papers)

  1. Front Matter
  2. Invited Talk

  3. Certificates

    1. Validation Algorithms for a Secure Internet Routing PKI
      David Montana, Mark Reynolds
      Pages 17-30
    2. Instant Revocation
      Jon A. Solworth
      Pages 31-48
    3. Optimized Certificates – A New Proposal for Efficient Electronic Document Signature Validation
      Ricardo Felipe Custódio, Martín A. Gagliotti Vigil, Juliano Romani, Fernando Carlos Pereira, Joni da Silva Fraga
      Pages 49-59
  4. Authentication

    1. Trust-Rated Authentication for Domain-Structured Distributed Systems
      Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle
      Pages 74-88
    2. Levels of Assurance and Reauthentication in Federated Environments
      Manuel Sánchez, Óscar Cánovas, Gabriel López, Antonio F. Gómez-Skarmeta
      Pages 89-103
  5. Practice

    1. Current Status of Japanese Government PKI Systems
      Yasuo Miyakawa, Takashi Kurokawa, Akihiro Yamamura, Yasushi Matsumoto
      Pages 104-117
    2. A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
      Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype
      Pages 118-133
  6. Signatures

    1. Fast Point Decompression for Standard Elliptic Curves
      Billy Bob Brumley, Kimmo U. Järvinen
      Pages 134-149
    2. An Efficient Strong Key-Insulated Signature Scheme and Its Application
      Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
      Pages 150-165
    3. Efficient Generic Forward-Secure Signatures and Proxy Signatures
      Basel Alomair, Krishna Sampigethaya, Radha Poovendran
      Pages 166-181
  7. Analysis

    1. Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
      Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater
      Pages 182-195
  8. Networks

    1. PEACHES and Peers
      Massimiliano Pala, Sean W. Smith
      Pages 223-238
  9. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008.

The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.

Keywords

DOM Public Key algorithms anonymity anonymous credentials certification cryptography digital signatures distributed systems e-government electronic healthcare healthcare identity privacy trust

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69484-7
  • Online ISBN 978-3-540-69485-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349