2023
DOI: 10.1155/2023/9559439
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Public Key Certificate-Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology

Abstract: With the development of cloud services and the Internet of Things, the integration of heterogeneous systems is becoming increasingly complex. Identity management is important in the coordination of various systems, and public key infrastructure (PKI) is widely known as an identity management methods. In PKI, a certificate authority (CA) acts as a trust point to guarantee the identity of entities such as users, devices, and services. However, traditional CAs that delegate the operations to a specific organizati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 37 publications
(45 reference statements)
0
1
0
Order By: Relevance
“…To mitigate this threat in our proposed scheme, robust verification mechanisms are essential. Implementing protocols for public key authentication enables users to verify the legitimacy of received keys [43] while leveraging certificate authorities (CAs) provides digital certificates to validate the identities of communication parties [44]. Additionally, adopting trust-on-first-use (TOFU) mechanisms allows users to verify public keys during initial interactions [45].…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…To mitigate this threat in our proposed scheme, robust verification mechanisms are essential. Implementing protocols for public key authentication enables users to verify the legitimacy of received keys [43] while leveraging certificate authorities (CAs) provides digital certificates to validate the identities of communication parties [44]. Additionally, adopting trust-on-first-use (TOFU) mechanisms allows users to verify public keys during initial interactions [45].…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…However, in light of the expansion of consortium-based IoT systems involving multiple stakeholders, the challenge is how to operate a private CA without relying on a specific party in the consortium. We have proposed a distributed public key certificate-issuing infrastructure (DCII) [2] that uses distributed ledger technology (DLT) to address the problem of a SPOT for CA-based PKI in private environments where devices are interconnected. In the DCII, CA functions are shared among parties as smart contracts, and logs of the process are recorded in a distributed ledger (DL) to improve CA transparency.…”
Section: Introductionmentioning
confidence: 99%