A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Rechained: Sybil-resistant distributed identities for the Internet of Things and mobile ad hoc networks

A Bochem, B Leiding - Sensors, 2021 - mdpi.com
Today, increasing Internet of Things devices are deployed, and the field of applications for
decentralized, self-organizing networks keeps growing. The growth also makes these …

Spidverify: A secure and privacy-preserving decentralised identity verification framework

AS Shehu, A Pinto, ME Correia - … International Conference on …, 2023 - ieeexplore.ieee.org
Traditional identity management (IdM) systems rely on third-party identity providers (IdPs)
and are centralised, which can make them vulnerable to data breaches and other security …

On the Compliance of Self-Sovereign Identity with GDPR Principles: A Critical Review

AS Shehu - arXiv preprint arXiv:2409.03624, 2024 - arxiv.org
Identity Management Systems (IdMs) have complemented how users are identified,
authenticated, and authorised on e-services. Among the methods used for this purpose are …

[HTML][HTML] New Ethereum-Based Distributed PKI with a Reward-and-Punishment Mechanism

CG Koa, SH Heng, JJ Chin - Blockchain: Research and Applications, 2024 - Elsevier
This paper explores the critical role of Public Key Infrastructure (PKI) in ensuring the security
of electronic transactions, particularly in validating the authenticity of websites in online …

Authenticating HTTPS Connection without Relying on Certification Authorities

SW Dadi, AS Wazan, I Taj - 2024 15th Annual Undergraduate …, 2024 - ieeexplore.ieee.org
Internet security heavily depends on Transport Layer Security (TLS) and X. 509 certificates.
A Certification Authority (CA) issues these certificates so users can safely connect to verified …

Formalizing the blockchain-based blockvoke protocol for fast certificate revocation using colored petri nets

A Sujatanagarjuna, A Bochem, B Leiding - Information, 2021 - mdpi.com
Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or
incomplete specifications, in general, pose risks to the direct users of a protocol and further …

Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation

A Sujatanagarjuna, A Bochem, B Leiding - Cryptography, 2022 - mdpi.com
Certificates are integral to the security of today's Internet. Protocols like BlockVoke allow
secure, timely and efficient revocation of certificates that need to be invalidated. ACME, a …

Postcertificates for revocation transparency

N Korzhitskii, M Nemec, N Carlsson - arXiv preprint arXiv:2203.02280, 2022 - arxiv.org
The modern Internet is highly dependent on trust communicated via certificates. However, in
some cases, certificates become untrusted, and it is necessary to revoke them. In practice …

Append-Only Authenticated Data Sets Based on RSA Accumulator

Q Tong, L Yin, Y Liu, J Xu - International Conference on Data Security and …, 2024 - Springer
The existing ADSs do not support the append-only feature and fork consistency of
transparent logs. Therefore, it is very necessary and urgent to research new types of ADSs …