A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Blockchain from the information systems perspective: Literature review, synthesis, and directions for future research

CF Lei, EWT Ngai - Information & Management, 2023 - Elsevier
This paper profiled blockchain studies in information systems (IS) journals from 2016 to
2022. Drawing on the 443 selected articles from 77 IS journals, we proposed a classification …

Dynamic threshold ECDSA signature and application to asset custody in blockchain

H Wang, W Ma, F Deng, H Zheng, Q Wu - Journal of Information Security …, 2021 - Elsevier
The centralized exchange is one of the hottest DeFi applications based on blockchain
transaction systems. However, depositing user assets to the exchanges brings the security …

A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism

E Turan, S Sen, T Ergun - IEEE Access, 2024 - ieeexplore.ieee.org
The conventional Public Key Infrastructure (PKI) has long been plagued by security issues
stemming from its centralized and non-transparent design. In recent years, blockchain …

Monitoring Key Pair Usage through Distributed Ledgers and One-Time Signatures

L Mayr, L Palma, G Zambonin, W Silvano, R Custódio - Information, 2023 - mdpi.com
Private key management is a complex obstacle arising from the traditional public key
infrastructure model. However, before any related security breach can be addressed, it must …

Linking Souls to Humans with ZKBID: Accountable Anonymous Blockchain Accounts for Web 3.0 Decentralized Identity

T Wang, S Zhang, SC Liew - arXiv preprint arXiv:2301.02102, 2023 - arxiv.org
A decentralized identity system that can provide users with self-sovereign digital identities to
facilitate complete control over their own data is paramount to Web 3.0. The accounting …

[PDF][PDF] A Scalable Bitcoin-based Public Key Certificate Management System.

C Tartan, C Wright, M Pettit, W Zhang - SECRYPT, 2021 - pdfs.semanticscholar.org
The main challenges with traditional public key infrastructures arise from the detection of
fraudulent public key certificates and the timely retrieval of an up-to-date record of revoked …

Armored Core of PKI: Remove Signing Keys for CA via Physically Unclonable Function

X Zhang, C Chen, K Qin, C Zhang, S Qu… - arXiv preprint arXiv …, 2024 - arxiv.org
The protection of CA's signing keys is one of the most crucial security concerns in PKI.
However, these keys can still be exposed today by human errors or various carefully …

An improved practical Byzantine fault-tolerant consensus algorithm combined with aggregating signature

B Jin, Y Hu, H Tao, Y He - 7th International Symposium on …, 2022 - spiedigitallibrary.org
The consensus algorithm is a key technology of blockchain and determines the performance
of distributed systems. The PBFT algorithm with high communication complexity and poor …

[PDF][PDF] Konzept und Implementierung einer dezentralen Public Key Infrastruktur auf Blockchain Basis Concept and Implementation of a decentralized Public Key …

A Reiter - 2022 - pub.fh-campuswien.ac.at
Kurzfassung Public Key Infrastrukturen (PKI) und Zertifizierungsstellen (Certificate
Authorities-CA) spielen eine entscheidende Rolle für die Sicherheit des Internets. Angriffe …