DTKI: A New Formalized PKI with Verifiable Trusted Parties
The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifi...
Gespeichert in:
Veröffentlicht in: | Computer journal 2016-11, Vol.59 (11), p.1695-1713 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1713 |
---|---|
container_issue | 11 |
container_start_page | 1695 |
container_title | Computer journal |
container_volume | 59 |
creator | Yu, Jiangshan Cheval, Vincent Ryan, Mark |
description | The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees. |
doi_str_mv | 10.1093/comjnl/bxw039 |
format | Article |
fullrecord | <record><control><sourceid>hal_cross</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01403899v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>oai_HAL_hal_01403899v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</originalsourceid><addsrcrecordid>eNo9kM1PgzAYxhujiTg9eu_VA-7tx6DdbZnOkRH1gF6bUkrWBcS0KNO_XgnG05M8X4cfQtcEbglINjdde3hr5uVxACZPUER4AjGFJD1FEQCBmCcUztFFCAcAoCCTCC3vil22xCv8aAe86XyrG_dtK_y8y_Dg-j1-td7VTpeNxYX_CP2Yad87Gy7RWa2bYK_-dIZeNvfFehvnTw_ZepXHhhHoYyqkpoylgjGARSVrk6Ta0sRITUpTLoQUhImKcksYtYZTyVNZg65LSoS2gs3QzfS71416967V_kt12qntKlejB4QDE1J-kt9uPHWN70Lwtv4fEFAjJDVBUhMk9gOXe1m-</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</creator><creatorcontrib>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</creatorcontrib><description>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxw039</identifier><language>eng</language><publisher>Oxford University Press (UK)</publisher><subject>Computer Science ; Cryptography and Security</subject><ispartof>Computer journal, 2016-11, Vol.59 (11), p.1695-1713</ispartof><rights>Attribution</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</citedby><cites>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</cites><orcidid>0000-0002-3622-2129</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,27922,27923</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01403899$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Yu, Jiangshan</creatorcontrib><creatorcontrib>Cheval, Vincent</creatorcontrib><creatorcontrib>Ryan, Mark</creatorcontrib><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><title>Computer journal</title><description>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</description><subject>Computer Science</subject><subject>Cryptography and Security</subject><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNo9kM1PgzAYxhujiTg9eu_VA-7tx6DdbZnOkRH1gF6bUkrWBcS0KNO_XgnG05M8X4cfQtcEbglINjdde3hr5uVxACZPUER4AjGFJD1FEQCBmCcUztFFCAcAoCCTCC3vil22xCv8aAe86XyrG_dtK_y8y_Dg-j1-td7VTpeNxYX_CP2Yad87Gy7RWa2bYK_-dIZeNvfFehvnTw_ZepXHhhHoYyqkpoylgjGARSVrk6Ta0sRITUpTLoQUhImKcksYtYZTyVNZg65LSoS2gs3QzfS71416967V_kt12qntKlejB4QDE1J-kt9uPHWN70Lwtv4fEFAjJDVBUhMk9gOXe1m-</recordid><startdate>20161101</startdate><enddate>20161101</enddate><creator>Yu, Jiangshan</creator><creator>Cheval, Vincent</creator><creator>Ryan, Mark</creator><general>Oxford University Press (UK)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-3622-2129</orcidid></search><sort><creationdate>20161101</creationdate><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><author>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer Science</topic><topic>Cryptography and Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yu, Jiangshan</creatorcontrib><creatorcontrib>Cheval, Vincent</creatorcontrib><creatorcontrib>Ryan, Mark</creatorcontrib><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yu, Jiangshan</au><au>Cheval, Vincent</au><au>Ryan, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DTKI: A New Formalized PKI with Verifiable Trusted Parties</atitle><jtitle>Computer journal</jtitle><date>2016-11-01</date><risdate>2016</risdate><volume>59</volume><issue>11</issue><spage>1695</spage><epage>1713</epage><pages>1695-1713</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><abstract>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</abstract><pub>Oxford University Press (UK)</pub><doi>10.1093/comjnl/bxw039</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-3622-2129</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0010-4620 |
ispartof | Computer journal, 2016-11, Vol.59 (11), p.1695-1713 |
issn | 0010-4620 1460-2067 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_01403899v1 |
source | Oxford University Press Journals All Titles (1996-Current) |
subjects | Computer Science Cryptography and Security |
title | DTKI: A New Formalized PKI with Verifiable Trusted Parties |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T14%3A23%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DTKI:%20A%20New%20Formalized%20PKI%20with%20Verifiable%20Trusted%20Parties&rft.jtitle=Computer%20journal&rft.au=Yu,%20Jiangshan&rft.date=2016-11-01&rft.volume=59&rft.issue=11&rft.spage=1695&rft.epage=1713&rft.pages=1695-1713&rft.issn=0010-4620&rft.eissn=1460-2067&rft_id=info:doi/10.1093/comjnl/bxw039&rft_dat=%3Chal_cross%3Eoai_HAL_hal_01403899v1%3C/hal_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |