DTKI: A new formalized PKI with verifiable trusted parties

43Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.

Cite

CITATION STYLE

APA

Yu, J., Cheval, V., & Ryan, M. (2016). DTKI: A new formalized PKI with verifiable trusted parties. Computer Journal, 59(11), 1695–1713. https://doi.org/10.1093/comjnl/bxw039

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free