© 2013 IEEE. In the recent years, the vulnerabilities of conventional public key infrastructure are exposed by the real-world attacks, such as the certificate authority's single-point-of-failure or clients' private information leakage. Aimed at the first issue, one type of approach is that multiple entities are introduced to assist the certificate operations, including registration, update, and revocation. However, it is inefficient in computation. Another type is to make the certificate information publicly visible by bringing in the log servers. Nevertheless, the data synchronization among log servers may lead to network latency. Based on the second approach, the blockchain-based public key infrastructure schemes are proposed. Through the...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpose...
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) ma...
The PKI framework is a widely used network identity verification framework. Users will register thei...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Traditional ways of distributing and verifying academic certificates are not efficient. Certificates...
Both the academy and industry believe that Intelligent Transportation System (ITS) would be achievab...
Fake education certificates or fake degree is one of the major concerns in higher education. This fr...
Cloud storage can provide a way to effectively store and manage big data. However, due to the separa...
This paper examines the vulnerabilities inherent in prevailing Public Key Infrastructure (PKI) syste...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpose...
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) ma...
The PKI framework is a widely used network identity verification framework. Users will register thei...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Traditional ways of distributing and verifying academic certificates are not efficient. Certificates...
Both the academy and industry believe that Intelligent Transportation System (ITS) would be achievab...
Fake education certificates or fake degree is one of the major concerns in higher education. This fr...
Cloud storage can provide a way to effectively store and manage big data. However, due to the separa...
This paper examines the vulnerabilities inherent in prevailing Public Key Infrastructure (PKI) syste...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...