Interoperation between a PKI and an ID-based infrastructure
Speaker: Chris Mitchell
14th April 2004 , 2pm , Room 519, Claremont Tower
Abstract
Suppose that members of two separate security domains wish to intercommunicate in a secure way. Suppose also that domain A uses a 'conventional' PKI, with one or more CAs, whereas domain B operates an ID-based public key infrastructure, with one or more trusted key generation entities (trusted authorities). Given that the members of the two domains wish to inter-operate, i.e. verify signatures generated by each other and/or send each other encrypted messages, there needs to be a means for members of domain to obtain trusted copies of public keys for members of domain B, and vice versa.
In this talk we will explore some aspects of this problem, and consider possible solutions. The work described is joint research with Geraint Price.
-----------
Professor Chris Mitchell
Information Security Group
Royal Holloway, University of London
|