TY - JOUR
T1 - Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list
AU - Prakasha, Krishna
AU - Muniyal, Balachandra
AU - Acharya, Vasundhara
AU - Krishna, Suyash
AU - Prakash, Smriti
PY - 2018/7/4
Y1 - 2018/7/4
N2 - Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.
AB - Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.
UR - http://www.scopus.com/inward/record.url?scp=85054713894&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85054713894&partnerID=8YFLogxK
U2 - 10.1080/19393555.2018.1516836
DO - 10.1080/19393555.2018.1516836
M3 - Article
AN - SCOPUS:85054713894
SN - 1939-3555
VL - 27
SP - 214
EP - 229
JO - Information Security Journal
JF - Information Security Journal
IS - 4
ER -