Leak in Trusted Root Certificates Management and the Method for Solving

ZHU Guo-dong,NING Hong-zhou,HE De-quan
DOI: https://doi.org/10.3321/j.issn:1000-436x.2005.06.017
2005-01-01
Abstract:The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted root certificates management tree based on binary signature tree was presented, and the forming of trusted root certificates management tree and the algorithm of trusted root certificates verification were given. Thus, the trusted root certificates management tree not only keeps the trusted root certificates from being replaced, but also have little size and light computing.
What problem does this paper attempt to address?