DTKI: A New Formalized PKI with Verifiable Trusted Parties

Jiangshan Yu 1 Vincent Cheval 2 Mark Ryan 1
2 PESTO - Proof techniques for security protocols
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.
Document type :
Journal articles
Complete list of metadatas

Cited literature [33 references]  Display  Hide  Download

Contributor : Vincent Cheval <>
Submitted on : Monday, November 28, 2016 - 9:37:01 AM
Last modification on : Tuesday, December 18, 2018 - 4:38:25 PM
Long-term archiving on : Tuesday, March 21, 2017 - 3:50:22 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License




Jiangshan Yu, Vincent Cheval, Mark Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties. The Computer Journal, Oxford University Press (UK), 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩. ⟨hal-01403899⟩



Record views


Files downloads