University of Newcastle upon Tyne   Faculty of Science Agriculture and Engineering    School of Computing Science   For Researchers
  Decoration http://www.ncl.ac.uk/  

  About Us ] [ For Applicants ] [ For Students ] [ For Researchers ] [ For Business ] [ Internal Website ] [ Search ]

Interoperation between a PKI and an ID-based infrastructure

Speaker: Chris Mitchell

14th April 2004 , 2pm , Room 519, Claremont Tower

Abstract

Suppose that members of two separate security domains wish to intercommunicate in a secure way. Suppose also that domain A uses a 'conventional' PKI, with one or more CAs, whereas domain B operates an ID-based public key infrastructure, with one or more trusted key generation entities (trusted authorities). Given that the members of the two domains wish to inter-operate, i.e. verify signatures generated by each other and/or send each other encrypted messages, there needs to be a means for members of domain to obtain trusted copies of public keys for members of domain B, and vice versa.

In this talk we will explore some aspects of this problem, and consider possible solutions. The work described is joint research with Geraint Price.

-----------
Professor Chris Mitchell
Information Security Group
Royal Holloway, University of London

Last Modified: 25 September, 2003