A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptographic trust across parties in the form of chains of certificates. In existing PKIs, Alice cannot send a message to Bob confidentially until a complete chain of trust from Alice to Bob exists. We observe that this temporal restriction---which may be severely limiting in some contexts like whistleblowing---can be eliminated by combining webs of trust with concepts from hierarchical identity-based encryption. Specifically, we present a novel protocol that allows Alice to securely send a message to Bob, binding to any chain of social links, with...
A Certication Authority (CA) can be used to certify keys and build a public-key infrastructure (PKI)...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Abstract. Webs of trust constitute a decentralized infrastructure for es-tablishing the authenticity...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Deniable Authentication is a highly desirable property for secure messaging protocols: it allows a s...
peer reviewedWe consider a setup in which the channel from Alice to Bob is less noisy than the chann...
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve t...
Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers ha...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
While the most common transitive trust model for identity validation in use over Internet is the hea...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
International audienceThe security of public key validation protocols for web-based applications has...
The social demand for email end-to-end encryption is barely supported bymainstream service providers...
A Certication Authority (CA) can be used to certify keys and build a public-key infrastructure (PKI)...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Abstract. Webs of trust constitute a decentralized infrastructure for es-tablishing the authenticity...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Deniable Authentication is a highly desirable property for secure messaging protocols: it allows a s...
peer reviewedWe consider a setup in which the channel from Alice to Bob is less noisy than the chann...
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve t...
Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers ha...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
While the most common transitive trust model for identity validation in use over Internet is the hea...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
International audienceThe security of public key validation protocols for web-based applications has...
The social demand for email end-to-end encryption is barely supported bymainstream service providers...
A Certication Authority (CA) can be used to certify keys and build a public-key infrastructure (PKI)...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...