Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…1.1.1 PKI without blockchain [11][12][13][14][15][16] This section discusses about existing PKIs frameworks which have not used blockchain. Proposed accountable key infrastructure (AKI) 12 is used to defend domains and clients from flaws induced by single points of failure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…1.1.1 PKI without blockchain [11][12][13][14][15][16] This section discusses about existing PKIs frameworks which have not used blockchain. Proposed accountable key infrastructure (AKI) 12 is used to defend domains and clients from flaws induced by single points of failure.…”
Section: Related Workmentioning
confidence: 99%
“…The Notary‐based PKI (NBPKI) 16 approach creates a group of trustworthy individuals known as notarial authorities (NA). The NA confirms the reliability of a certificate for validating a certain signature at a specified time.…”
Section: Introductionmentioning
confidence: 99%
“…The Notary-based PKI (NBPKI) 19 approach creates a group of trustworthy individuals known as Notarial Authorities (NA).…”
Section: Pki Without Blockchainmentioning
confidence: 99%
“…The certificates issued by the local authority are stored by a third party, which are trimmed to SPoF. In NBPKI 19 RA is in charge of authenticating the user's identification, and the NA maintains the user's status as trusted or untrusted based on the RA's decision. The malicious RA has the potential to compromise the system's integrity.…”
Section: Critical Analysismentioning
confidence: 99%
“…Another possible solution to the conventional PKI system is the W ebof T rust(W oT ) based PKI. The W ebof T rust(W oT ) includes notary-based solutions such as LocalP KI [ [14] and N otary−basedP KI [15] that are intended to offer different PKI systems that enable the end-user to use their known trusted node to act as the CA. In this type of PKI, the N otaryAuthorities(N As) replaced CAs to store the only signed hash of the certificate and its serial number in the database.…”
Section: Introductionmentioning
confidence: 99%