2018 IEEE International Conference on Data Mining Workshops (ICDMW) 2018
DOI: 10.1109/icdmw.2018.00022
|View full text |Cite
|
Sign up to set email alerts
|

BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure

Abstract: This paper describes BlockPKI, a blockchain-based public-key infrastructure that enables an automated, resilient, and transparent issuance of digital certificates. Our goal is to address several shortcomings of the current TLS infrastructure and its proposed extensions. In particular, we aim at reducing the power of individual certification authorities and make their actions publicly visible and accountable, without introducing yet another trusted third party. To demonstrate the benefits and practicality of ou… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 20 publications
0
21
0
2
Order By: Relevance
“…Recently, Dykcik et al proposed BlockPKI that stores domains' certificates in a blockchain 22 . Briefly, in the BlockPKI, to eliminate the weakest link security, a requester requests multiple CAs to endorse a domain certificate using a multisignature algorithm (adopting the Schnorr algorithm).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, Dykcik et al proposed BlockPKI that stores domains' certificates in a blockchain 22 . Briefly, in the BlockPKI, to eliminate the weakest link security, a requester requests multiple CAs to endorse a domain certificate using a multisignature algorithm (adopting the Schnorr algorithm).…”
Section: Related Workmentioning
confidence: 99%
“…We presume that the cryptographic building that we use for such as commitment, hash function, and signature is secure. Table 2 compares security of our scheme with the following seven log‐ and blockchain‐based proposals: CT, 19 AKI, 4 ARPKI, 34 DTKI, 55 BlockPKI, 22 CertChain, 59 and CertLedger 18 …”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Outside the VC realm, there are different proposals for PKI to be resilient against compromised insiders. Such schemes rely on signing a certificate by more than a threshold number of CAs, e.g., [44,62]; however, such schemes cannot be used by VC systems. For example, issuing a certificate in [44] takes approximately 2 minutes and it varies with the number of required CAs.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Such schemes rely on signing a certificate by more than a threshold number of CAs, e.g., [44,62]; however, such schemes cannot be used by VC systems. For example, issuing a certificate in [44] takes approximately 2 minutes and it varies with the number of required CAs. Obviously, this contradicts with on-demand pseudonym acquisition strategies for VC systems, e.g., [55,56,60,65], which necessitate efficient pseudonym provisioning.…”
Section: Background and Related Workmentioning
confidence: 99%