2016 IEEE European Symposium on Security and Privacy (EuroS&P) 2016
DOI: 10.1109/eurosp.2016.38
|View full text |Cite
|
Sign up to set email alerts
|

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem

Abstract: In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy. A few certification authorities (CAs) are currently responsible for the issuance of the large majority of TLS certificates. These certificates are considered valid only if the certificate of the issuing CA is also valid. The certificates of these important CAs are effectively too big to be revoked, as … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 34 publications
(26 citation statements)
references
References 36 publications
0
26
0
Order By: Relevance
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…In PoliCert, one Merkle tree contains both the certificates and revocation information, ordered by a hash of the certificate H(C). In yet another variant of these ideas, PKI Safety Net [24] enables verification of both the issuing time order and the non-existence of records for a domain by maintaining two trees that are similar to those in CT and AKI, respectively. Independent monitors maintain a copy of the trees and audit their consistency.…”
Section: Public Logs For Monitoring the Web Pkimentioning
confidence: 99%
“…Both appendonly and ordered Merkle trees enable logarithmic-size proofs of existence and non-existence for certificates, though. In yet another variant of these ideas, PKI Safety Net [36] enables verification of both the issuing time order and the nonexistence of records for a domain by maintaining two trees that are similar to those in CT and AKI, respectively. Independent monitors maintain a copy of the trees and audit their consistency.…”
Section: Public Ledgermentioning
confidence: 99%