The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method

T Zhang, Z Lan, X Gao, J Guan - International Symposium on Mobile …, 2021 - Springer
The rapid development of network technology has brought new challenges to data security.
As the first gateway of a certain mobile internet system, access authentication is an essential …

Revisiting privacy-aware blockchain public key infrastructure

O Omolola, P Plessing - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Abstract Privacy-aware Blockchain Public Key Infrastructure (PB-PKI) is a recent proposal by
Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the …

[PDF][PDF] Revisiting Privacy-aware Blockchain Public Key Infrastructure.

P Plessing, O Omolola - ICISSP, 2020 - scitepress.org
Privacy-aware Blockchain Public Key Infrastructure (PB-PKI) is a recent proposal by Louise
Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain …

[PDF][PDF] Recoverable private key scheme for consortium blockchain based on verifiable secret sharing

G Li, L You, G Hu, L Hu - KSII Transactions on Internet and Information …, 2021 - itiis.org
As a current popular technology, the blockchain has a serious issue: the private key cannot
be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there …

A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust

R Halder, D Das Roy, D Shin - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL)
certifications to establish secure communication. However, the centralized nature of …

Public key infrastructure traditional and modern implementation

O Albogami, M Alruqi, K Almalki… - International Journal of …, 2021 - airitilibrary.com
The public key infrastructure (PKI) method is used to implement strong authentication, data
encryption, and digital signatures. The PKI traditional approaches use certificate authorities …

Certificateless Identity Management and Authentication Scheme Based on Blockchain Technology

C Han, F Wen - INTERNATIONAL CONFERENCE ON WIRELESS …, 2021 - Springer
Identity management and authentication in cyberspace is crucial for all forms of remote
communication. The traditional authentication technology has great security risks due to its …

Dizar: An Architecture of Distributed Public Key Infrastructure Based on Permissoned Blockchain

Q Dai, K Xu, L Dai, S Guo - … , CBCC 2019, Chengdu, China, October 11–13 …, 2020 - Springer
With the current blockchain-based Public Key Infrastructure (PKI) being in its early stage of
R&D, it is suffering from many shortcomings, such as its reliance on the centralized …

[PDF][PDF] Review of blockchain-based public key infrastructure

CG Koa, SH Heng, SY Tan, JJ Chin - Cryptology and Information …, 2020 - mscr.org.my
ABSTRACT Public Key Infrastructure (PKI) provides a secure mean of authenticating
identities over the Internet. A blockchain is a decentralised transaction and data …

Blockchain-based distributed identity cryptography key management

Y Yu, Z Li, Y Tu, Y Yuan, Y Li… - 2023 15th International …, 2023 - ieeexplore.ieee.org
The identity-based cryptography algorithm SM9 requires a trusted third-party key generation
center KGC to generate the user's private key. This will bring the risks and problems of key …