DTKI: A New Formalized PKI with Verifiable Trusted Parties

Jiangshan Yu 1 Vincent Cheval 2 Mark Ryan 1
2 PESTO - Proof techniques for security protocols
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.
Document type :
Journal articles
Complete list of metadatas

Cited literature [33 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01403899
Contributor : Vincent Cheval <>
Submitted on : Monday, November 28, 2016 - 9:37:01 AM
Last modification on : Tuesday, December 18, 2018 - 4:38:25 PM
Long-term archiving on : Tuesday, March 21, 2017 - 3:50:22 AM

File

YCR-tcj16.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Collections

Citation

Jiangshan Yu, Vincent Cheval, Mark Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties. The Computer Journal, Oxford University Press (UK), 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩. ⟨hal-01403899⟩

Share

Metrics

Record views

410

Files downloads

165