Paper
3 December 2015 Design and implementation of PKI-based certification authority
Ying Zheng, Qinghai Bai, Linna Zhao, Hua Chun, Jing Chen
Author Affiliations +
Proceedings Volume 9794, Sixth International Conference on Electronics and Information Engineering; 979437 (2015) https://doi.org/10.1117/12.2203236
Event: Sixth International Conference on Electronics and Information Engineering, 2015, Dalian, China
Abstract
PKI achieves the management of public key by certificates. It combines the user’s public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user’s identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ying Zheng, Qinghai Bai, Linna Zhao, Hua Chun, and Jing Chen "Design and implementation of PKI-based certification authority", Proc. SPIE 9794, Sixth International Conference on Electronics and Information Engineering, 979437 (3 December 2015); https://doi.org/10.1117/12.2203236
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Internet

Cryptography

Computer security

Information security

Network security

Electronics engineering

RELATED CONTENT

Review of RFID security technology
Proceedings of SPIE (December 19 2021)
Private escrow key management: a method and its issues
Proceedings of SPIE (March 12 1996)
Access and accounting schemes of wireless broadband
Proceedings of SPIE (April 28 2004)
Research of UMTS core network firewall base on IXP1200
Proceedings of SPIE (February 20 2006)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top