2020
DOI: 10.1002/dac.4503
|View full text |Cite
|
Sign up to set email alerts
|

SCM: Secure and accountable TLS certificate management

Abstract: Summary In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 55 publications
0
1
0
Order By: Relevance
“…Split-world attack [103] is a core approach to providing irrelevant log data where certain users are allowed a fake form of the log from a malicious log server. A technical attacker can get a fraudulent certificate as valid from the users.…”
Section: Reconnaissancementioning
confidence: 99%
“…Split-world attack [103] is a core approach to providing irrelevant log data where certain users are allowed a fake form of the log from a malicious log server. A technical attacker can get a fraudulent certificate as valid from the users.…”
Section: Reconnaissancementioning
confidence: 99%