IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057201
|View full text |Cite
|
Sign up to set email alerts
|

Checks and balances: A tripartite public key infrastructure for secure web-based connections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…However, ARPKI has no support for multi-domain certificates, and it has an extra delay because of the involvement of all designated parties in all processes [49]. TriPKI [50] utilized a threshold-signature scheme among a list of trusted CAs, trusted DNSes, and trusted LSes to distribute trust and assure secure communication. Reference [50] substitutes third-party validators with DNSes and adopts checks-and-balances among the trusted set of CAs, DNSes, and LSes to watch each other behavior.…”
Section: Related Workmentioning
confidence: 99%
“…However, ARPKI has no support for multi-domain certificates, and it has an extra delay because of the involvement of all designated parties in all processes [49]. TriPKI [50] utilized a threshold-signature scheme among a list of trusted CAs, trusted DNSes, and trusted LSes to distribute trust and assure secure communication. Reference [50] substitutes third-party validators with DNSes and adopts checks-and-balances among the trusted set of CAs, DNSes, and LSes to watch each other behavior.…”
Section: Related Workmentioning
confidence: 99%
“…It also distributes trust among multiple entities, cross‐checks the behavior of one with those of others, and involves all parties in every process. TriPKI 53 leverage threshold‐signature algorithm among CAs, DNSs, and ILSs to distribute trust and ensure secure communication. Their scheme replaces third‐party validators with DNSs and introduces checks‐and‐balances among the CAs, DNSs, and ILSs to detect each other misbehavior.…”
Section: Related Workmentioning
confidence: 99%
“…If one CA is compromised, the process of certificate registration may need to restart. Chen et al [1] design a tripartite PKI system called TriPKI by bringing in the DNSs and Integrity Log servers (ILSs) to assist CA in managing certificates. Through the threshold signature algorithm among multiple entities, the system can tolerate the failure of a certain number of CAs or other entities.…”
Section: A Disperse the Trust Of Camentioning
confidence: 99%
“…However, real-world attacks have indicated the vulnerability of the existing CA [1]. Intuitively, if a CAs has been attacked, a malicious web server may get a verifiable certificate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation