B requests for A's certificate and verifies with the key sent to him/her.
There is an attack exists as follows:
- A sends message, cert and cert key to B.
- A sends cert revocation request to CA after confirming the cert and key were successfully accepted.
- B receives the revocation information from CA.
- A repudiate the message.
It is totally possible that a private key owner keeps using the key before they find that it has been compromised. So, in the above case A can successfully make repudiation.
My question is, can the above attack really be applied? If so, how can it be avoided?
Edit: If it was an intentional attack by the private key owner, it would be totally different from the case of the attacker using the time difference between A's revocation request and B's receipt of the updated CRL information, which can be mitigated by OCSP.