Public key infrastructures (PKIs) enable users to look up and verify one another’s public keys based on identities. Current approaches to PKIs are vulnerable because they do not offer sufficiently strong guarantees of identity retention; that is, they do not effectively prevent one user from registering a public key under another’s already-registered identity. In this paper, we leverage the consistency guarantees provided by cryptocurrencies such as Bitcoin and Namecoin to build a PKI that ensures identity retention. Our system, called Certcoin, has no central authority and thus requires the use of secure distributed dictionary data structures to provide efficient support for key lookup.
Conventional public-key infrastructure (PKI) designs using certificate authorities and web-of-trust ...
Today, the integrity and authenticity of digital documents and data are often hard to verify. Existi...
International audienceWith a boom in online services generally accessed through a login/password cou...
The role of Internet of Things (IoT) devices is becoming larger in our day-to-day life. More and mor...
In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based ...
The PKI framework is a widely used network identity verification framework. Users will register thei...
A Certication Authority (CA) can be used to certify keys and build a public-key infrastructure (PKI)...
With the development of Public Key Infrastructure (PKI), there implements lots of identity managemen...
Public key infrastructure (PKI) plays a fundamental role in securing the infrastructure of the Inter...
In order to enable intrinsic security without the Public Key Infrastructure (PKI) deployment, flat s...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; the...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Conventional public-key infrastructure (PKI) designs using certificate authorities and web-of-trust ...
Today, the integrity and authenticity of digital documents and data are often hard to verify. Existi...
International audienceWith a boom in online services generally accessed through a login/password cou...
The role of Internet of Things (IoT) devices is becoming larger in our day-to-day life. More and mor...
In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based ...
The PKI framework is a widely used network identity verification framework. Users will register thei...
A Certication Authority (CA) can be used to certify keys and build a public-key infrastructure (PKI)...
With the development of Public Key Infrastructure (PKI), there implements lots of identity managemen...
Public key infrastructure (PKI) plays a fundamental role in securing the infrastructure of the Inter...
In order to enable intrinsic security without the Public Key Infrastructure (PKI) deployment, flat s...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; the...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Conventional public-key infrastructure (PKI) designs using certificate authorities and web-of-trust ...
Today, the integrity and authenticity of digital documents and data are often hard to verify. Existi...
International audienceWith a boom in online services generally accessed through a login/password cou...