CTB-PKI: Clustering and trust enabled blockchain based PKI system for efficient communication in P2P network
The decentralization feature of public and private blockchain-based applications is achieved
by selecting different nodes as validators or Certificate Authority () for each transaction …
by selecting different nodes as validators or Certificate Authority () for each transaction …
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
The world increasingly depends on archives to store digital documents, such as land
registers and medical records, for long periods of time. For stored documents to remain …
registers and medical records, for long periods of time. For stored documents to remain …
Smart contract assisted blockchain based public key infrastructure system
Public key infrastructure (PKI) is a reliable solution for Internet communication. PKI finds
applications in secure email, virtual private network (VPN), e‐commerce, e‐governance, and …
applications in secure email, virtual private network (VPN), e‐commerce, e‐governance, and …
BB-PKI: Blockchain-based public key infrastructure certificate management
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen
more frequently. The current PKI that use Registration Authorities/Certificate Authorities …
more frequently. The current PKI that use Registration Authorities/Certificate Authorities …
Certification with multiple signatures
X Wang, Y Bai, L Hu - Proceedings of the 4th Annual ACM Conference …, 2015 - dl.acm.org
Certificate Authority (CA) is a single point of failure in the design of Public Key Infrastructure
(PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can …
(PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can …
Assessing trust in the long-term protection of documents
M Vigil, D Cabarcas, J Buchmann… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
Digital archives rely on trusted parties, such as certification authorities, to ensure
authenticity, integrity and proof of existence protection for documents. In this paper, we …
authenticity, integrity and proof of existence protection for documents. In this paper, we …
Smart Contract Assisted Blockchain based PKI System
The proposed smart contract can prevent seven cyber attacks, such as Denial of Service
(DoS), Man in the Middle Attack (MITM), Distributed Denial of Service (DDoS), 51 …
(DoS), Man in the Middle Attack (MITM), Distributed Denial of Service (DDoS), 51 …
Domain based certification and revocation
X Wang, Y Bai, L Hu - Proceedings of the International …, 2015 - search.proquest.com
Abstract Certificate Authorities (CAs) are considered as a single point of failure in the design
of Public Key Infrastructure (PKI). Adversaries can take the advantage of a compromised CA …
of Public Key Infrastructure (PKI). Adversaries can take the advantage of a compromised CA …
Security engineering for E-government web services: A trust model
B Al-Shargabi - 2016 International Conference on Information …, 2016 - ieeexplore.ieee.org
Nowadays, the widespread of the application of web services opens new dawn for e-
government applications due to its interoperability that brought by application of web …
government applications due to its interoperability that brought by application of web …
A performance analysis of long-term archiving techniques
A challenge for digital archives managing long lived data, such as medical records and land
registers, is to guarantee long-term authenticity, integrity, and datedness. Although some …
registers, is to guarantee long-term authenticity, integrity, and datedness. Although some …