Modelling a Public-Key Infrastructure

A global public-key infrastructure (PKI), components of which are emerging in the near future, is a prerequisite for security in distributed systems and for electronic commerce. The purpose of this paper is to propose an approach to modelling and reasoning about a PKI from a user Alice's point of view. Her view, from which she draws conclusions about the authenticity of other entities' public keys and possibly about the trustworthiness of other entities, consists of statements about which public keys she believes to be authentic and which entities she believes to be trustworthy, as well as a collection of certificates and recommendations obtained or retrieved from the PKI. The model takes into account recommendations for the trustworthiness of entities. Furthermore, it includes confidence values for statements and can exploit arbitrary certification structures containing multiple intersecting certification paths to achieve a higher confidence value than for any single certification path. Confidence values are measured on a continuous scale between 0 and 1 and, in contrast to previous work in this area, are interpreted as probabilities in a well-defined random experiment.

[1]  Virgil D. Gligor,et al.  On Inter-Realm Authentication in Large Distributed Systems , 1993, J. Comput. Secur..

[2]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1951 .

[3]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[4]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Ueli Maurer,et al.  A Calculus for Secure Channel Establishment in Open Networks , 1994, ESORICS.

[6]  S. Chokhani Toward a national public key infrastructure , 1994, IEEE Communications Magazine.

[7]  J.J. Tardo,et al.  SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Nils J. Nilsson,et al.  Probabilistic Logic * , 2022 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Reihaneh Safavi-Naini,et al.  Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.

[13]  Glenn H. MacEwen,et al.  A logic for reasoning about security , 1992, TOCS.

[14]  Virgil D. Gilgor,et al.  On inter-realm authentication in large distributed systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Ronald Fagin,et al.  Uncertainty, belief, and probability , 1989, IJCAI 1989.

[16]  Anil Nerode,et al.  Logic for Applications , 1997, Graduate Texts in Computer Science.

[17]  Butler W. Lampson,et al.  A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.

[18]  Gene Tsudik,et al.  KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.

[19]  P. Venkat Rangan An axiomatic theory of trust in secure communication protocols , 1992, Comput. Secur..

[20]  Colin Boyd,et al.  Security Architectures Using Formal Methods , 1993, IEEE J. Sel. Areas Commun..

[21]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[22]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.