About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

ChainPKI-Towards Ethash-based Decentralized PKI with Privacy Enhancement

In Proceedings of 2021 Ieee Conference on Dependable and Secure Computing — 2021, pp. 1-8
From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Public key infrastructure (PKI) is the most widely adopted framework aiming to protect the communications between servers and clients, by authenticating users and devices in the digital world. In order to mitigate the single point of failure (SPOF) posed by a centralized PKI architecture, decentralized PKI has received much more attention, which can decentralize the responsibility of certificate authorities.

Many blockchain-based PKI systems are developed such as BlockPGP, Blockstack and NoPKI. However, it is found that some existing systems are susceptible to privacy leakage. In this work, we first compare the functionality between blockchain-based PKI systems and analyze the potential privacy issues. Then we focus on Luo's PKI system that adopts the concept of neighborhood and propose a privacy-Aware blockchain-based PKI called ChainPKI, by enhancing the privacy.

Our experimental results indicate the effectiveness of our enhanced system auainst notential nrivacv leakaoe,

Language: English
Publisher: IEEE
Year: 2021
Pages: 1-8
Proceedings: 2021 IEEE Conference on Dependable and Secure Computing
ISBN: 1728175348 , 1728175356 , 9781728175348 and 9781728175355
Types: Conference paper
DOI: 10.1109/DSC49826.2021.9346273
ORCIDs: Chiu, Wei Yang , Meng, Weizhi and Jensen, Christian D.

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis