2020 IEEE International Conference on Consumer Electronics (ICCE) 2020
DOI: 10.1109/icce46568.2020.9043086
|View full text |Cite
|
Sign up to set email alerts
|

SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In addition, research on decentralized public key authentication is also in progress. The authors of [22][23][24][25][26] focus on the public and decentralized PKI system model and described a detailed scheme and the application of decentralized, PKI-based secure communication. Their designs provide the essential functions of PKIs, such as the registering, updating, revoking and verifying of the ownership of a public key.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, research on decentralized public key authentication is also in progress. The authors of [22][23][24][25][26] focus on the public and decentralized PKI system model and described a detailed scheme and the application of decentralized, PKI-based secure communication. Their designs provide the essential functions of PKIs, such as the registering, updating, revoking and verifying of the ownership of a public key.…”
Section: Related Workmentioning
confidence: 99%
“…Several alternative revocation status protocols have been developed [5], [6], [39], [45], as well as novel PKIs [3], [24], [47], [48], [52]; however, all of these protocols and PKIs require large changes to the infrastructure. Similarly, many other semi-centralized and decentralized PKIs, revocation protocols and logs have been proposed [7], [16], [17], [25], [28], [32], [44], [46], [50]. Matsumoto et al [36] propose a decentralized framework that incentivizes CAs to monitor for certificate misissuance through financial penalties.…”
Section: B Revocation Processmentioning
confidence: 99%
“…It provides a self-signed HTTPS root certi cate that allows clients to intercept encrypted tra c when visiting HTTP websites. "Super sh" manages Lenovo websites and issues certi cates of fraud [18][19][20]. The public key associated with the certi cate is published in the public key directory and can be easily modi ed to replace the public key of another entity [21][22].…”
Section: B) Managing the Private Keysmentioning
confidence: 99%
“…At present, generally identity veri cation is based on public key cryptography. Authors proposed blockchain based distributed PKI to resolved issues of rationalize PKI with the management of public key[19].…”
mentioning
confidence: 99%