2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00026
|View full text |Cite
|
Sign up to set email alerts
|

Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Lei et al [21] propose an efcient certifcate revocation scheme in vehicle communication systems (VCS). Ahmed and Aura [22] propose a SC-assisted public key infrastructure (SCP) to manage certifcate trust statuses. CAs and domain owners register and publish their certifcate policies on the blockchain such that each participant can verify the trust status of certifcates.…”
Section: Related Workmentioning
confidence: 99%
“…Lei et al [21] propose an efcient certifcate revocation scheme in vehicle communication systems (VCS). Ahmed and Aura [22] propose a SC-assisted public key infrastructure (SCP) to manage certifcate trust statuses. CAs and domain owners register and publish their certifcate policies on the blockchain such that each participant can verify the trust status of certifcates.…”
Section: Related Workmentioning
confidence: 99%
“…Bloockchain based PKI [17][18][19][20][21][22][23][24][25][26][27][28] This paper primarily addresses eight attributes to compare different PKI system such as feature, type of blockchain network, blockchain platform, certificate, trust model, off-chain storage, on-chain and time complexity. Table 1 shows the detailed study of different blockchain based PKI systems.…”
Section: 12mentioning
confidence: 99%
“…When new anonymous node requests to join the network, the entire network is disrupted until the joining request is processed. The developed PKI TTA0.3emSC$$ TTA\kern0.3em SC $$ in article 22 suffers from the loss of control issue over the blockchain network if it loses the key pair of the lead node under some cyber‐attacks. The DDoS attack to a particular lead node can make the system destabilized.…”
Section: Implementation and Comparisonmentioning
confidence: 99%
“…When new anonymous node requests to join the network, the entire network is disrupted until the joining request is processed. The developed PKI in article 25 suffers from the loss of control issue over the blockchain network if it loses the key pair of the lead node under some cyber attacks. The DDoS attack to a particular lead node can make the system destabilized.…”
Section: Critical Analysismentioning
confidence: 99%