2022
DOI: 10.48550/arxiv.2203.01661
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: SCT Auditing in Certificate Transparency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…It operates logs itself and requires that any certificate appears in at least two logs. (Previously, Google even required one of the two logs to be a log operated by Google, although this has now changed [123]. )…”
Section: Maintaining Transparencymentioning
confidence: 99%
See 1 more Smart Citation
“…It operates logs itself and requires that any certificate appears in at least two logs. (Previously, Google even required one of the two logs to be a log operated by Google, although this has now changed [123]. )…”
Section: Maintaining Transparencymentioning
confidence: 99%
“…Some interactions also involve privacy concerns for individual users via their browser, such as when a proof of inclusion in a log is queried, which reveals the website that the user is browsing. As a result, most clients do not directly request proofs of inclusion, although solutions based on fuzzy ranges, private set intersection, and private set membership protocols have been proposed [123].…”
Section: Certificate Transparencymentioning
confidence: 99%