Fast digital identity revocation

Extended abstract
  • William Aiello
  • Sachin Lodha
  • Rafail Ostrovsky
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1462)


The availability of fast and reliable Digital Identities is an essential ingredient for the successful implementation of the public-key infrastructure of the Internet. All digital identity schemes must include a method for revoking someone's digital identity in the case that this identity is stolen (or canceled) before its expiration date (similar to the cancelation of a credit-cards in the case that they are stolen). In 1995, S. Micali proposed an elegant method of identity revocation which requires very little communication between users and verifiers in the system. In this paper, we extend his scheme by reducing the overall CA to Directory communication, while still maintaining the same tiny user to vendor communication. We contrast our scheme to other proposals as well.


Certificate authority certificate revocation signatures public-key infrastructure digital identities 


  1. 1.
    W. Diffie, M. Hellman, “New directions in cryptography”, IEEE Trans, on Inf. Theory, IT-22, pp. 644–654, 1976.MathSciNetCrossRefGoogle Scholar
  2. 2.
    S. Even, O. Goldreich and S. Micali “On-line/Off-line Digital Signatures” CRYPTO 1989.Google Scholar
  3. 3.
    S. Goldwasser, S. Micali “Probabilistic Encryption” JCSS Vol. 28 No. 22. April 1984.Google Scholar
  4. 4.
    S. Goldwasser, S. Micali, R. Rivest “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks” SIAM Journal of Computing, Vol. 17, No 2, April 1988, pp. 281–308.MATHMathSciNetCrossRefGoogle Scholar
  5. 5.
    C. Jutla and M. Yung “Paytree: amortized signature for flexible micropayments” In Second USENIX workshop on Electronic Commerce, November 1996.Google Scholar
  6. 6.
    P. Kocker, “A quick introduction to Certificate Revocation Trees (CRTs),” Scholar
  7. 7.
    L. Lamport “Password authentication with insecure communication” Communications of ACM, 24(11):770–771, November 1981.MathSciNetCrossRefGoogle Scholar
  8. 8.
    R. C. Merkle, “A Certified Digital Signature,” Proceedings of Crypto'89, pp. 234–246, 1989.Google Scholar
  9. 9.
    S. Micali “Enhanced Certificate Revocation System” Technical memo MIT/LCS/TM-542, November 1995. available online URL Scholar
  10. 10.
    S. Micali “Certificate Revocation System” U.S. Patent number 5666416, issued Sep. 9, 1997.Google Scholar
  11. 11.
    M. Naor and K. Nissim, “Certificate Revocation and Certificate Update,” Proceedings of USENIX '98.Google Scholar
  12. 12.
    R. Rivest “The MD5 message-digest algorithm” Internet Request for Comments, April 1992. RFC 1321 available online URL Scholar
  13. 13.
    R. Rivest, A. Shamir, L. Adleman “A Method for Obtaining Digital Signature and Public Key Cryptosystems” Comm. ACM, Vol 21, No. 2, 1978.Google Scholar
  14. 14.
    R. Rivest, B. Lampson “SDSI-A Simple Distributed Security Infrastructure” available online URL rivest/sdsi10.htmlGoogle Scholar
  15. 15.
    M. Reiter, S. Stubblebine “Towards Acceptable Metrics of Authentication” In Proc. of 1997 IEEE Symposium on Security and Privacy.Google Scholar
  16. 16.
    VeriSign Corporation, available online URL Scholar
  17. 17.
    Microsoft “Proposal for Authenticating Code Via the Internet” April 1996, available online URL Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • William Aiello
    • 1
  • Sachin Lodha
    • 2
  • Rafail Ostrovsky
    • 1
  1. 1.Bell Communications ResearchUSA
  2. 2.Computer Science DepartmentRutgers UniversityUSA

Personalised recommendations