DTKI: A New Formalized PKI with Verifiable Trusted Parties

The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer journal 2016-11, Vol.59 (11), p.1695-1713
Hauptverfasser: Yu, Jiangshan, Cheval, Vincent, Ryan, Mark
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1713
container_issue 11
container_start_page 1695
container_title Computer journal
container_volume 59
creator Yu, Jiangshan
Cheval, Vincent
Ryan, Mark
description The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.
doi_str_mv 10.1093/comjnl/bxw039
format Article
fullrecord <record><control><sourceid>hal_cross</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01403899v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>oai_HAL_hal_01403899v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</originalsourceid><addsrcrecordid>eNo9kM1PgzAYxhujiTg9eu_VA-7tx6DdbZnOkRH1gF6bUkrWBcS0KNO_XgnG05M8X4cfQtcEbglINjdde3hr5uVxACZPUER4AjGFJD1FEQCBmCcUztFFCAcAoCCTCC3vil22xCv8aAe86XyrG_dtK_y8y_Dg-j1-td7VTpeNxYX_CP2Yad87Gy7RWa2bYK_-dIZeNvfFehvnTw_ZepXHhhHoYyqkpoylgjGARSVrk6Ta0sRITUpTLoQUhImKcksYtYZTyVNZg65LSoS2gs3QzfS71416967V_kt12qntKlejB4QDE1J-kt9uPHWN70Lwtv4fEFAjJDVBUhMk9gOXe1m-</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</creator><creatorcontrib>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</creatorcontrib><description>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxw039</identifier><language>eng</language><publisher>Oxford University Press (UK)</publisher><subject>Computer Science ; Cryptography and Security</subject><ispartof>Computer journal, 2016-11, Vol.59 (11), p.1695-1713</ispartof><rights>Attribution</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</citedby><cites>FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</cites><orcidid>0000-0002-3622-2129</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,27922,27923</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01403899$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Yu, Jiangshan</creatorcontrib><creatorcontrib>Cheval, Vincent</creatorcontrib><creatorcontrib>Ryan, Mark</creatorcontrib><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><title>Computer journal</title><description>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</description><subject>Computer Science</subject><subject>Cryptography and Security</subject><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNo9kM1PgzAYxhujiTg9eu_VA-7tx6DdbZnOkRH1gF6bUkrWBcS0KNO_XgnG05M8X4cfQtcEbglINjdde3hr5uVxACZPUER4AjGFJD1FEQCBmCcUztFFCAcAoCCTCC3vil22xCv8aAe86XyrG_dtK_y8y_Dg-j1-td7VTpeNxYX_CP2Yad87Gy7RWa2bYK_-dIZeNvfFehvnTw_ZepXHhhHoYyqkpoylgjGARSVrk6Ta0sRITUpTLoQUhImKcksYtYZTyVNZg65LSoS2gs3QzfS71416967V_kt12qntKlejB4QDE1J-kt9uPHWN70Lwtv4fEFAjJDVBUhMk9gOXe1m-</recordid><startdate>20161101</startdate><enddate>20161101</enddate><creator>Yu, Jiangshan</creator><creator>Cheval, Vincent</creator><creator>Ryan, Mark</creator><general>Oxford University Press (UK)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-3622-2129</orcidid></search><sort><creationdate>20161101</creationdate><title>DTKI: A New Formalized PKI with Verifiable Trusted Parties</title><author>Yu, Jiangshan ; Cheval, Vincent ; Ryan, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c310t-289a2337833005d9fc67ae26c9a1bcb5898138d24e132ec429479f0afb218ae83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer Science</topic><topic>Cryptography and Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yu, Jiangshan</creatorcontrib><creatorcontrib>Cheval, Vincent</creatorcontrib><creatorcontrib>Ryan, Mark</creatorcontrib><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yu, Jiangshan</au><au>Cheval, Vincent</au><au>Ryan, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DTKI: A New Formalized PKI with Verifiable Trusted Parties</atitle><jtitle>Computer journal</jtitle><date>2016-11-01</date><risdate>2016</risdate><volume>59</volume><issue>11</issue><spage>1695</spage><epage>1713</epage><pages>1695-1713</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><abstract>The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.</abstract><pub>Oxford University Press (UK)</pub><doi>10.1093/comjnl/bxw039</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-3622-2129</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0010-4620
ispartof Computer journal, 2016-11, Vol.59 (11), p.1695-1713
issn 0010-4620
1460-2067
language eng
recordid cdi_hal_primary_oai_HAL_hal_01403899v1
source Oxford University Press Journals All Titles (1996-Current)
subjects Computer Science
Cryptography and Security
title DTKI: A New Formalized PKI with Verifiable Trusted Parties
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T14%3A23%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DTKI:%20A%20New%20Formalized%20PKI%20with%20Verifiable%20Trusted%20Parties&rft.jtitle=Computer%20journal&rft.au=Yu,%20Jiangshan&rft.date=2016-11-01&rft.volume=59&rft.issue=11&rft.spage=1695&rft.epage=1713&rft.pages=1695-1713&rft.issn=0010-4620&rft.eissn=1460-2067&rft_id=info:doi/10.1093/comjnl/bxw039&rft_dat=%3Chal_cross%3Eoai_HAL_hal_01403899v1%3C/hal_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true