International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 11 August 2014

Jiangshan Yu, Vincent Cheval, Mark Ryan
ePrint Report ePrint Report
The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks.

Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. How- ever, those proposals involve a fixed set of authorities which create a monopoly, and they have heavy reliance on trusted parties that monitor the logs.

We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the monopoly of service providers and removes the reliance on trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.

Expand

Additional news items may be found on the IACR news page.