2020
DOI: 10.1109/access.2020.2996997
|View full text |Cite
|
Sign up to set email alerts
|

Attack-Resilient TLS Certificate Transparency

Abstract: The security of Public-Key Infrastructure (PKI) for Internet-based communications has lately attracted researchers' attention because of Certification Authorities (CAs) crashes and consequent attacks. Google Certificate Transparency and subsequent log-based PKI proposals (e.g., AKI and ARPKI) have succeeded in making certificate-management processes more transparent, accountable, and verifiable. However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conforman… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…To calculate the clustering coefficient of these networks, scientists apply the query to nodes other than the sampled nodes. In fact, in social networks and large scale networks, the estimation of network-based features is difficult because the sizes of these networks are extremely large [28,29]. Also, they contain large datasets that are occasionally unavailable because of privacy concerns [30].…”
Section: Introductionmentioning
confidence: 99%
“…To calculate the clustering coefficient of these networks, scientists apply the query to nodes other than the sampled nodes. In fact, in social networks and large scale networks, the estimation of network-based features is difficult because the sizes of these networks are extremely large [28,29]. Also, they contain large datasets that are occasionally unavailable because of privacy concerns [30].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed method achieves transparency, provides a framework for service-level agreement (SLA) enforcement, and relaxes availability requirements. The recent work of S. Khan, et al on attack-resilient TLS certificate transparency has motivated further research [ 15 ]. A secure transmission on the cost of computation and routing overhead is a problem for 5G/6G.…”
Section: Introductionmentioning
confidence: 99%