Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23379
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Certificate Transparency and End-to-End Encrypted Mail

Abstract: Abstract-The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend certificate transparency, a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using PKI with no requirement to trust certificate authorities, or to rely on complex peer-topeer key-signing arran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
99
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 114 publications
(99 citation statements)
references
References 27 publications
0
99
0
Order By: Relevance
“…Popular E2E-encrypted tools (e.g., iMessage, WhatsApp, Signal) relieve users of key management; they simply query a trusted server that vouches for the authentic public keys of other users. Recent proposals attempt to limit the trust in these servers using transparency logs [37], [38], but this approach has not been deployed in practice.…”
Section: A Secure Communicationsmentioning
confidence: 99%
“…Popular E2E-encrypted tools (e.g., iMessage, WhatsApp, Signal) relieve users of key management; they simply query a trusted server that vouches for the authentic public keys of other users. Recent proposals attempt to limit the trust in these servers using transparency logs [37], [38], but this approach has not been deployed in practice.…”
Section: A Secure Communicationsmentioning
confidence: 99%
“…Proof A is referred to as proof of presence and proof B is referred to as proof of extension. Certificate transparency has been extended to provide proofs of absence and proofs of currency [3]. Proof of absence demonstrates that any data having a given attribute is absent from the log.…”
Section: Enc(m Ek)mentioning
confidence: 99%
“…Since the log will contain one current valid ephemeral certificate for each user, we need to use a log structure that supports efficient proof of currency when the log contains multiple valid certificates of different clients. One possible log structure is proposed in ECT [3].…”
Section: The Public Log Structure and Proofsmentioning
confidence: 99%
See 1 more Smart Citation
“…-We define publicly verifiable consistency for an ADS scheme and show how it enables a forward-secure source (Section 6). Verifiable inserts can also have applications for monitors in, e.g., [3,10,11,12,21,26].…”
Section: Introductionmentioning
confidence: 99%