Several of our “Babysteps” examine PKI; see the following:
- No. 8: A critical look at Bridge CAs argues that BCAs might not be ideal in non-government environments, because they aim at establishing the equivalence of certificates.
- No. 5: PKI interoperability unpacks how digital certificates can help with the act of authentication and shows it really isn’t complicated.
- No. 4: Exposing some PKI myths acknowledges the grains of truth behind many of today’s misconceptions, and unpacks the real issues.
- No. 1: PKI in health & welfare sets out PKI’s unique ability to secure paperless transactions in the complex, high risk, long lived and multi-party applications characteristic of the health & welfare sector.
IEEE paper on PKI based COVID certificates
A recent paper published by the IEEE on how to build a digital yellow book using commmunity PKI.
Read moreTuring Institute poster paper on Community PKI
I presented at the Turing Institute Trusted Digital Identity conference a design for decentralised PKI to reach the “Goldilocks” point for harmonised certificate interoperability but autonomous registration rules.
Read moreNew models for the management of PKI and Root CAs
An old paper that set out a quality control role for Root CAs, that would demystify their function, and simply PKI business models.
Read moreSome limitations of web of trust models
An old paper of mine with some relevance today as some stakeholders in digital identity architectures remain averse to hierarchical identification relationships.
Read more“Public Key Superstructure”
A major peer reviewed paper presented at the NIST’s 7th Symposium on Identity and Trust on the Internet, March 2008. This work draws together most of Stephen’s deep thinking on PKI from over a decade’s work, canvassing the reasons for PKI’s historical difficulties, popular misconceptions, and ways to break the unhelpful nexus betwen Big PKI and centralised ID systems.
Read moreA novel application of PKI smartcards to anonymise Health Identifiers
A paper presented to the academic stream of the AusCERT 2005 conference about using anonymous digital certificates to securely convey health identifiers.
Read more“Known Customer” certificates at Medicare
Around 2006, Lockstep worked with Medicare Australia’s Health eSignature Authority on a world’s first digital credential project.
Read moreThe importance of PKI today
An international update published in “China Communications” Dec 2005
Read moreRelationship Certificates
A modified form of identity’ certificate for conveying credentials, based on work commissioned by the Australian Government Information Management Office.
Read moreThe “Security Printer” model for CA operations
A simple new conceptual model to describe the role of backend CAs, likening them to secure printing bureaus, and thus decoupling CAs from business relationships between PKI end users.
Read morePosition Paper on PKI Governance in Australia
Developed for the Australian IT Security Forum for input into the National Authentication Framework deliberations in 2003.
Read morePosition Statement on PKI of the Australian Security Industry
Prepared for the Australian IT Security Forum, November 2003. “Our vision has been developed through extensive dialogue with users and with government. The position is deeply informed by practical experience of some of the world’s largest and most effective PKI rollouts. We present here the major implications of this experience for systems integration, PKI regulation and cross border interoperability.”
Read moreAudit based public key infrastructure
This breakthrough paper from 2000 articulated in detail an interoperable PKI where the fitness for purpose and standards-conformance of certificates were evidenced by digital audit certificates. The audit of CAs would be overseen by an ISO 17025 accreditation framework, scalable to build an international PKI under the auspices of existing accreditation bodies.
Read morePrivacy positive aspects of public key infrastructures
Published in April 1999 in Privacy Law and Policy Reporter, this paper perhaps for the first time described how digital certificates could represent credentials, memberships and business relationships, instead of personal identity.
Read morePKI Without Tears
A critical analysis of orthodox PKI, including a detailed outline of how a health PKI could be implemented
Read moreRethinking PKI – the electronic business card
Appeared in the international Secure Computing Magazine. It argues against one-size-fits-all “identity” certificates, because in business, we do not entertain stranger-to-stranger transactions. The paper also includes a useful taxonomy of electronic signature regulations.
Read moreLeveraging external accreditation to achieve PKI cross-recognition
A light touch, standards-based framework for cross-recognition of Certification Authorities that have been externally accredited, thus allowing certificates from one jurisdiction to be used in another. Paper presented to the Attorney Generals Privacy and Security conference, Melbourne, August 2001.
Read moreDemystifying international cross-recognition of PKI
A pioneering paper delivered in 2001 to the Information Security Solutions Europe Conference, London, outlining an international PKI framework.
Read moreWill Biometrics Obsolete PKI?
A Special Report, for the American Bar Association Bulletin of Law/Science & Technology, No. 117, June 2001
Read moreAttribute Certificates and their Limitations
A critical review of “Attribute Certificates” and the problems associated with using them to convey special rights and credentials. First appeared in the Quarterly Journal of the PricewaterhouseCoopers Cryptographic Centre of Excellence Issue 3, 2000. Reproduced with persmission.
Read moreProblems in Mandating Strong Personal EOI in PKI
Discussion paper written for the Australian delegation to the APEC TEL 23 Meeting, Canberra, 2001.
Read moreA vulnerability analysis of roaming soft certificate solutions
I wrote this paper for my SANS Institute GSEC Certification in 2002. It analyses the general risks associated with safekeeping of end users’ private keys in a PKI (and includes some reflections on the idea of “non repudiation”).
Read more