CTB-PKI: Clustering and trust enabled blockchain based PKI system for efficient communication in P2P network

A Panigrahi, AK Nayak, R Paul, B Sahu, S Kant - IEEE Access, 2022 - ieeexplore.ieee.org
The decentralization feature of public and private blockchain-based applications is achieved
by selecting different nodes as validators or Certificate Authority () for each transaction …

Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey

M Vigil, J Buchmann, D Cabarcas, C Weinert… - Computers & …, 2015 - Elsevier
The world increasingly depends on archives to store digital documents, such as land
registers and medical records, for long periods of time. For stored documents to remain …

Smart contract assisted blockchain based public key infrastructure system

A Panigrahi, AK Nayak, R Paul - Transactions on Emerging …, 2023 - Wiley Online Library
Public key infrastructure (PKI) is a reliable solution for Internet communication. PKI finds
applications in secure email, virtual private network (VPN), e‐commerce, e‐governance, and …

BB-PKI: Blockchain-based public key infrastructure certificate management

A Garba, Q Hu, Z Chen… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen
more frequently. The current PKI that use Registration Authorities/Certificate Authorities …

Certification with multiple signatures

X Wang, Y Bai, L Hu - Proceedings of the 4th Annual ACM Conference …, 2015 - dl.acm.org
Certificate Authority (CA) is a single point of failure in the design of Public Key Infrastructure
(PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can …

Assessing trust in the long-term protection of documents

M Vigil, D Cabarcas, J Buchmann… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
Digital archives rely on trusted parties, such as certification authorities, to ensure
authenticity, integrity and proof of existence protection for documents. In this paper, we …

Smart Contract Assisted Blockchain based PKI System

A Panigrahi, AK Nayak, R Paul - arXiv preprint arXiv:2207.09127, 2022 - arxiv.org
The proposed smart contract can prevent seven cyber attacks, such as Denial of Service
(DoS), Man in the Middle Attack (MITM), Distributed Denial of Service (DDoS), 51 …

Domain based certification and revocation

X Wang, Y Bai, L Hu - Proceedings of the International …, 2015 - search.proquest.com
Abstract Certificate Authorities (CAs) are considered as a single point of failure in the design
of Public Key Infrastructure (PKI). Adversaries can take the advantage of a compromised CA …

Security engineering for E-government web services: A trust model

B Al-Shargabi - 2016 International Conference on Information …, 2016 - ieeexplore.ieee.org
Nowadays, the widespread of the application of web services opens new dawn for e-
government applications due to its interoperability that brought by application of web …

A performance analysis of long-term archiving techniques

M Vigil, C Weinert, K Braden, D Demirel… - 2014 IEEE Intl Conf …, 2014 - ieeexplore.ieee.org
A challenge for digital archives managing long lived data, such as medical records and land
registers, is to guarantee long-term authenticity, integrity, and datedness. Although some …