2002
DOI: 10.1145/571637.571638
|View full text |Cite
|
Sign up to set email alerts
|

Coca

Abstract: COCA is a fault-tolerant and secure online certification authority that has been built and deployed both in a local area network and in the Internet. Extremely weak assumptions characterize environments in which COCA's protocols execute correctly: no assumption is made about execution speed and message delivery delays; channels are expected to exhibit only intermittent reliability; and with 3t + 1 COCA servers up to t may be faulty or compromised. COCA is the first system to integrate a Byzantine quorum system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
134
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 218 publications
(135 citation statements)
references
References 45 publications
1
134
0
Order By: Relevance
“…Some protocols for proactive recovery of servers were proposed in [4,21,13]. Our protocol uses the same assumptions adopted in [4], that presents a protocol for active replication, but does not use threshold cryptography for signatures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some protocols for proactive recovery of servers were proposed in [4,21,13]. Our protocol uses the same assumptions adopted in [4], that presents a protocol for active replication, but does not use threshold cryptography for signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Our protocol uses the same assumptions adopted in [4], that presents a protocol for active replication, but does not use threshold cryptography for signatures. Other works that use threshold cryptography are COCA [21], that implements a fault-tolerant online certification authority, and CODEX [13], that implements a distributed service for storage and dissemination of secrets. These works employ the APSS [22] proactive secret sharing protocol to update the shares of a service private key.…”
Section: Related Workmentioning
confidence: 99%
“…Such an infrastructure for distributing and verifying signed updates already exists in many pieces of software for securing automatic software updates. The trusted authority could be implemented using multiple servers [25] to withstand attacks to a fraction of the servers.…”
Section: B Alert Generation Propagation and Processingmentioning
confidence: 99%
“…MACs, however, rely on secret-key setup and do not provide transferability-the property that signed messages accepted by one server and forwarded to other servers will be accepted there too. Transferability is essential in many applications of digital signature schemes (e.g., in distributed systems [7,21,30]). …”
Section: Introductionmentioning
confidence: 99%