attacks on the certificate-database. It is only needed
to verify the signature, in comparison with X.509
AS where both the certificate and the signature need
to be validated.
Another benefit compared to X.509 AS is that
there is no need to “look up” and validate the public
key certificate of the receiving parts, as long as the
public string ID is known. The public parameters are
the same for all entities related to the same PKG,
and only need to be fetched once.
On the other hand, the PKG has access to all
private keys. It need to be unconditionally trusted,
like the AS in Kerberos, and is suited for attack. The
master key needs to be securely stored.
X.509 AS is based on users identity, and is well
suited when access is based on identity. But in many
cases, particularly in cross-domain cooperation,
access permissions are based on roles and privileges
rather than the users actual identity.
Attribute certificates and SPKI make an easy way to
grant collective access for groups, and is therefore
suited for RBAC. The main difference between the
two technologies is the assigning of certificates,
where AC relies on a certification authority while
SPKI leave the issuing of certificates to the source-
owner. IBE also makes a good basis for collective
access to groups, as public key can be any arbitrary
string (e.g. role-name), and is suited for RBAC. In
addition, it offers authentication, thus need not rely
on a separate authentication mechanism.
Although there have been some work on the
security of IBE it is still in an early stage, and has
not been ‘attacked’ to the same degree as more
familiar technologies. Thus it is not as accepted as
‘older’ technologies, which have proven their
security throughout several attempts of attack.
REFERENCES
Al-Riyami, S. & Paterson, K. (2003) Certificateless public
key cryptography. Advances in Cryptology -
Asiacrypt'03. Springer-Verlag.
Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-
Libera, G. & et al. (2005) Web Service Trust
Language (WS-Trust). IBM.
Atkinson, B., Della-Libera, G., Hada, S., Hallam-Baker,
P., Hondo, M. & et al. (2002a) Web Service Security
Kerberos Token Profile OASIS.
Atkinson, B., Della-Libera, G., Hada, S., Hondo, M.,
Hallam-Baker, P. & et al. (2002b) Spesification: Web
Service Security (WS-Security). IN KALER, C. (Ed.),
IMB
Boneh, D. & Franklin, M. (2001) Identity-Based
Encryption from the Weil Pairing. Lecture Notes in
Computer Science, 2139, 213-240.
Chadwick, D., Otenko, A. & Ball, E. (2003) Role-based
access control with X.509 attribute certificates.
Internet Computing, IEEE, 7, 62-69.
Fabrice, K. A. H. (2003) Understanding Kerberos v5
authentication protocol. SANS institute.
Hogg, J., Smith, D., Chong, F., Taylor, D., Wall, L. &
SLATER, P. (2005) Web Service Security Microsoft.
Knight, S. & Grandy, C. (2002) Scalability Issues in PMI
Delegation. 1st Annual PKI Research Workshop.
Liimatainen, S. (2005) Usability of Decentralized
Authorization Systems - A Comperative Study.
System Sciences, 2005, HICSS'05. Proceedings of the
38th Annual Hawaii International Conference on.
Menezes, A. J., Van Oorschot, P. C. & Vanstone, S. A.
(1996) Trusted third parties and public-key
certificates. Handbook of Applied Cryptography.
CRC.
Mont, M. C., Bramhall, P. & Harrison, K. (2003) A
Flexible Role-based Secure Messaging Service:
Exploiting IBE Technology for Privacy in Health
Care. HP.
Stallings, W. (2003) Cryptography and Network Security,
Prentice Hall.
Thompson, M. R., Essiari, A. & Mudumbai, S. (2003)
Certificate-based authorization policy in a pki
environment. ACM Transactions on Information and
System Security, 6, 566-588.
Thurston, G., Siebenlist, F., Hughes, M., Reid, I. & et al.
(2004) Web Service Security X.509 Certificate Token
Profile. OASIS.
Zhang, Z. & Feng, D. (2005) On the Security of a
Certificateless Public-Key Encryption. Cryptology
ePrint Archive.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
418