2021
DOI: 10.17487/rfc9162
|View full text |Cite
|
Sign up to set email alerts
|

Certificate Transparency Version 2.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…Our description of Certificate Transparency (CT) and its components follows RFC 6962 [41]. We refer at various points to specific aspects of another RFC, 6962bis [42], which describes "version 2.0 of the Certificate Transparency protocol." To the best of our knowledge, RFC 6962 is an accurate description of CT as it exists today and there have been no announced plans to migrate CT to RFC 6962-bis.…”
Section: Sct Auditingmentioning
confidence: 99%
See 2 more Smart Citations
“…Our description of Certificate Transparency (CT) and its components follows RFC 6962 [41]. We refer at various points to specific aspects of another RFC, 6962bis [42], which describes "version 2.0 of the Certificate Transparency protocol." To the best of our knowledge, RFC 6962 is an accurate description of CT as it exists today and there have been no announced plans to migrate CT to RFC 6962-bis.…”
Section: Sct Auditingmentioning
confidence: 99%
“…RFC 6962-bis briefly suggests that inclusion proofs can be embedded in a certificate via a custom extension [42,Section 7.1.2]. This leaves open several questions, however, one of which is who should be responsible for embedding the inclusion proof.…”
Section: Embedding Fast and Slowmentioning
confidence: 99%
See 1 more Smart Citation
“…iCloud Keychain data could potentially be encrypted with keys derived directly from the user biometrics, but this isn't without risk either. Another plausible solution for authenticating Apple HSMs to users could entail a Certificate Transparency-like [123] solution wherein peers validate the addresses and correctness of the HSMs and publicly broadcast or peer-to-peer share this information. 30 Abstract control of the USB interface.…”
Section: Proposed Improvements To Iosmentioning
confidence: 99%
“…Beyond KT, there are a growing number of projects with similar goals: Certificate Transparency (CT) [5,19,32,[34][35][36]45], software transparency [2,23,41], and more general transparency [21,49]. Looking further into the future, one could imagine bringing transparency to aspects of government; e.g., a land registry in which anyone could obtain verifiable results of a lookup (finding the current owner of a property) or an audit (finding the entire history of ownership).…”
Section: Introductionmentioning
confidence: 99%