Proceedings of the 22nd International Conference on World Wide Web 2013
DOI: 10.1145/2488388.2488448
|View full text |Cite
|
Sign up to set email alerts
|

Accountable key infrastructure (AKI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 79 publications
(25 citation statements)
references
References 8 publications
0
23
0
Order By: Relevance
“…In this paradigm, certifications are included in append-only log structures: the log maintainer is able to prove that a specific certificate is present into the structure, and that each new added certificate has only extended the previous structure. The Accountable Key Infrastructure [16] exploits public-logs for the certificate management and distributes the trust between several entities. In [25], the authors provide a solution combining public revocation and a more largely distributed trust (using users' browsers) with the Certificate Issuance and Revocation Transparency.…”
Section: State Of the Artmentioning
confidence: 99%
“…In this paradigm, certifications are included in append-only log structures: the log maintainer is able to prove that a specific certificate is present into the structure, and that each new added certificate has only extended the previous structure. The Accountable Key Infrastructure [16] exploits public-logs for the certificate management and distributes the trust between several entities. In [25], the authors provide a solution combining public revocation and a more largely distributed trust (using users' browsers) with the Certificate Issuance and Revocation Transparency.…”
Section: State Of the Artmentioning
confidence: 99%
“…In this model, the security of PKI depends on the trustworthiness and security of the CAs, but their attested certificates cannot protect clients from the compromise of CAs themselves. The major weakness lies in the fact that a browser/operating system stores hundreds of CAs' certificates that are trusted to carry out authentication 4 . The security of clients in the current PKI depends on a single key of the CA, prone to theft or loss 4,5 .…”
Section: Introductionmentioning
confidence: 99%
“…The major weakness lies in the fact that a browser/operating system stores hundreds of CAs' certificates that are trusted to carry out authentication 4 . The security of clients in the current PKI depends on a single key of the CA, prone to theft or loss 4,5 . If a single CA is corrupted, it can maliciously issue a TLS certificate for any domain that is protected by any one of the other CAs, highlighting the idea of single‐point‐of‐failure and weakest link security 4 .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations