2018
DOI: 10.1109/tdsc.2016.2601610
|View full text |Cite
|
Sign up to set email alerts
|

Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 15 publications
0
30
0
Order By: Relevance
“…However, it is sufficient to corrupt two signing entities to conduct MitM attacks. ARPKI 34 identified attacks on AKI and mitigated those attacks. It provides a stout defense against attacks caused by single‐point‐of‐failure and strong adversary controlling n‐1 entities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is sufficient to corrupt two signing entities to conduct MitM attacks. ARPKI 34 identified attacks on AKI and mitigated those attacks. It provides a stout defense against attacks caused by single‐point‐of‐failure and strong adversary controlling n‐1 entities.…”
Section: Related Workmentioning
confidence: 99%
“…We presume that the cryptographic building that we use for such as commitment, hash function, and signature is secure. Table 2 compares security of our scheme with the following seven log‐ and blockchain‐based proposals: CT, 19 AKI, 4 ARPKI, 34 DTKI, 55 BlockPKI, 22 CertChain, 59 and CertLedger 18 …”
Section: Security Analysismentioning
confidence: 99%
“…The Design, Analysis, and Implementation of ARPKI: an Attack Resilient Public-Key Infrastructure [48] is public log-based Public-Key Infrastructure providing certificate related services and is an improvement over Accountable Key Infrastructure. In ARPKI, registering certificate requires the domain to contact only one CA, but a domain designates n service providers.…”
Section: Related Workmentioning
confidence: 99%
“…The Tamarin Prover is a symbolic tool for verification of security protocol that supports both unbounded verification and falsification in the nominal model. In the implementation of our model, we have abstracted several ideas just as in [47,48,69]. The log server is abstracted in the form of a list, and we also have only verified the security-related parameters of MCP instead of all other irrelevant information.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation