J. Baek, R. Safavi-naini, and W. Susilo, Certificateless Public Key Encryption Without Pairing, Information Security, 8th International Conference Proceedings, pp.134-148, 2005.
DOI : 10.1007/11556992_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092

D. Basin, C. Cremers, T. Hyun-jin, A. Kim, R. Perrig et al., ARPKI, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.382-393, 2014.
DOI : 10.1145/2382196.2382204

J. Bau and J. C. Mitchell, A security evaluation of DNSSEC with NSEC3, Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, 2010.

S. Bouzefrane, K. Garri, and P. Thoniel, A user-centric PKI based-protocol to manage FC2 digital identities, IJCSI International Journal of Computer Science Issues, vol.8, issue.1, pp.74-80, 2011.

H. Comon-lundh and V. Cortier, Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004.
DOI : 10.1016/j.scico.2003.12.002

URL : https://hal.archives-ouvertes.fr/inria-00099981

D. Cooper, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC, vol.5280, 2008.
DOI : 10.17487/rfc5280

D. Dolev and A. C. Yao, On the security of public key protocols, Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, SFCS '81, pp.350-357, 1981.

J. Dumas, P. Lafourcade, J. Orfila, and M. Puys, Private multiparty matrix multiplication and trust computations, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, pp.61-72, 2016.
DOI : 10.5220/0005957200610072

URL : https://hal.archives-ouvertes.fr/hal-01344750

C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, Proceedings of the 22Nd International Conference on Theory and Applications of Cryptographic Techniques, EURO- CRYPT'03, pp.272-293, 2003.
DOI : 10.1007/3-540-39200-9_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.2805

T. Kim, L. Huang, A. Perrig, C. Jackson, and V. Gligor, Accountable key infrastructure (AKI), Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.679-690, 2013.
DOI : 10.1109/SP.2011.45

B. Laurie, A. Langley, and E. Kasper, Certificate authority transparency and auditability. white paper, 2011.
DOI : 10.1145/2668152.2668154

S. Meier, B. Schmidt, C. Cremers, and D. A. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification -25th International Conference, CAV 2013, pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

J. L. Muñoz, O. Esparza, J. Forné, and E. Pallares, ???-OCSP: A protocol to reduce the processing burden in online certificate status validation, Electronic Commerce Research, vol.29, issue.3, p.255, 2008.
DOI : 10.1007/978-3-540-25980-0_7

M. Peylo and T. Kause, Internet X.509 Public Key Infrastructure ? HTTP Transfer for the Certificate Management Protocol (CMP), RFC, vol.6712, 2012.

R. Reddy and C. Wallace, Trust anchor management requirements, RFC, vol.6024, 2010.
DOI : 10.17487/rfc6024

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.2472

R. Mark-dermot, Enhanced certificate transparency and end-to-end encrypted mail, 21st Annual Network and Distributed System Security Symposium, NDSS 2014, 2014.

B. Schmidt, S. Meier, C. J. Cremers, and D. A. Basin, Automated analysis of diffiehellman protocols and advanced security properties, 25th IEEE Computer Security Foundations Symposium, CSF 2012, pp.78-94, 2012.
DOI : 10.1109/csf.2012.25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.8368

J. Vcelak, S. Goldberg, and D. Papadopoulos, NSEC5, DNSSEC Authenticated Denial of Existence. Internet-Draft draft-vcelak-nsec5-03, Progress, 2016.

J. Yu, V. Cheval, and M. Ryan, DTKI: A New Formalized PKI with Verifiable Trusted Parties, The Computer Journal, vol.59, issue.11, pp.1695-1713, 2016.
DOI : 10.1093/comjnl/bxw039

URL : https://hal.archives-ouvertes.fr/hal-01403899

R. Philip and . Zimmermann, The Official PGP User's Guide, 1995.