A distributed and hierarchical key issuing protocol in identity-based cryptosystem

N Wang, N Zhou, Y Zhi, B Wang - 2007 - IET
Key escrow is an inherent weakness of the identity-based cryptosystem. Secure key issuing
proposals previously proposed either lack concrete specification, or are vulnerable to …

Autonomous System Risk Level in the Route Server Infrastructure of an Internet Exchange Point

S Servillo, P Spadaccino, F Cuomo… - Proceedings of IFIP …, 2024 - iris.uniroma1.it
Abstract Internet Exchange Points (IXPs) play a fundamental role in the exchange of data
between Internet Service Providers (ISPs). However, they face one of the main challenges of …

RFC 7909: Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures

R Kisteleki, B Haberman - 2016 - dl.acm.org
This document describes a method that allows parties to electronically sign Routing Policy
Specification Language objects and validate such electronic signatures. This allows relying …

POSTER: IPKI: identity-based private key infrastructure for securing BGP protocol

P Chen, X Wang, Y Wu, J Su, H Zhou - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
For Securing BGP Protocol, this paper proposes an identity-based private key infrastructure
(iPKI) for managing self-attested IP (sIP) addresses. An sIP address endows the current IP …

Internet registry mechanism for preventing prefix hijacks

刘欣, 朱培栋, 彭宇行 - Journal of Software, 2009 - jos.org.cn
借鉴 IRR (Internet routing registry) 机制中注册路由策略的思想, 提出了前缀策略 (prefix policy)
的概念, 并由此设计了一种防范前缀劫持的方法——E-IRR 机制. 在 E-IRR 中 …

Decentralized trust in the inter-domain routing infrastructure

J Paillisse, J Manrique, G Bonet… - IEEE …, 2019 - ieeexplore.ieee.org
Inter-domain routing security is of critical importance to the Internet since it prevents
unwanted traffic redirections. The current system is based on a Public Key Infrastructure …

Beyond limits: How to disable validators in secure networks

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2023 - dl.acm.org
Relying party validator is a critical component of RPKI: it fetches and validates signed
authorizations mapping prefixes to their owners. Routers use this information to block bogus …

[PDF][PDF] Updates from the Internet backbone: An RPKI/RTR router implementation, measurements, and analysis

M Wählisch, F Holler, TC Schmidt, JH Schiller - NDSS, 2013 - ndss-symposium.org
A fundamental change in the Internet backbone routing started in January 2011: The
Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional …

[PDF][PDF] A trusted centralized public key to secure border gateway protocol

D Raimagia, S Singh - IJEIR, 2012 - academia.edu
The Secure Border Gateway Protocol (S-BGP) is used when two different Autonomous
System communicate with each other and upon reception of UPDATE from neighbor …

Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering

A Reuter, R Bush, I Cunha, E Katz-Bassett… - ACM SIGCOMM …, 2018 - dl.acm.org
A proposal to improve routing security---Route Origin Authorization (ROA)---has been
standardized. A ROA specifies which network is allowed to announce a set of Internet …