ETH Zürich » Computer Science » Theory » Cryptography

Public Key Infrastructures (PKI) and Digital Evidence

Research Highlights

  • New approaches to digital evidence. Digital evidence, such as digital signatures, is of crucial importance in the emerging digitally operating economy because it is easy to transmit, archive, search, and verify. Nevertheless the initial promises of the usefulness of digital signatures were too optimistic. This calls for a systematic treatment of digital evidence. In [Mau04] a foundation for reasoning about digital evidence systems and legislation is provided, thereby identifying the roles and limitations of digital evidence, in the apparently simple scenario where it should prove that an entity A agreed to a digital contract d. The approach is in sharp contrast to the current general views documented in the technical literature and in digital signature legislation. An entirely new view of the concepts of certification, time-stamping, revocation, and other trusted services, is proposed, potentially leading to new and more sound business models for trusted services.

Publications Concerning This Topic

Ueli Maurer
New Approaches to Digital Evidence
Proceedings of the IEEE, vol. 92, no. 6, pp. 933–947, Jun 2004.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer
Intrinsic Limitations of Digital Signatures and How to Cope With Them
Proceedings of the 6th Information Security Conference — ISC '03, Lecture Notes in Computer Science, Springer-Verlag, vol. 2851, pp. 180–192, Oct 2003.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Reto Kohlas and Ueli Maurer
Reasoning About Public-Key Certification —- On Bindings Between Entities and Public Keys
IEEE Journal on Selected Areas in Communication, vol. 18, no. 4, pp. 561–570, Apr 2000.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Reto Kohlas and Ueli Maurer
Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence
Public Key Cryptography — PKC 2000, Lecture Notes in Computer Science, vol. 1751, pp. 93–112, Jan 2000.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Reto Kohlas and Ueli Maurer
Reasoning about Public-key Certification — on Bindings Between Entities and Public Keys
Proceedings of Financial Cryptography — FC '99, Lecture Notes in Computer Science, Springer-Verlag, vol. 1648, pp. 86–103, Feb 1999.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer
Modelling a Public-Key Infrastructure
European Symposium on Research in Computer Security — ESORICS '96, Lecture Notes in Computer Science, Springer-Verlag, vol. 1146, pp. 325–350, Sep 1996.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Markus Stadler
Publicly Verifiable Secret Sharing
Advances in Cryptology — EUROCRYPT '96, Lecture Notes in Computer Science, Springer-Verlag, vol. 1070, pp. 190–199, May 1996.
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer and Pierre Schmid
A Calculus for Security Bootstrapping in Distributed Systems
Journal of Computer Security, vol. 4, no. 1, pp. 55–80, 1996, Preliminary version: [MS94].
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer and Pierre Schmid
A Calculus for Secure Channel Establishment in Open Networks
European Symposium on Research in Computer Security — ESORICS '94, Lecture Notes in Computer Science, Springer-Verlag, vol. 875, pp. 175–192, Nov 1994, Final version: [MS96].
Available files: [ PS ] [ PDF ] [ Abstract ] [ BibTeX ]

© IACR | Springer | ACM | IEEE


Main Research Page