Towards Sustainable Evolution for the TLS Public-Key Infrastructure

被引:2
|
作者
Lee, Taeho [1 ]
Pappas, Christos [1 ]
Szalachowski, Pawel [2 ]
Perrig, Adrian [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] SUTD, Singapore, Singapore
来源
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18) | 2018年
基金
欧洲研究理事会;
关键词
D O I
10.1145/3196494.3196520
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one particular enhancement is no panacea, since each one solves only a subset of the problems. At the same time, the high deployment barrier makes the benefit-cost ratio tilt in the wrong direction, leading to disappointing adoption rates for most proposals. As a way to escape from this conundrum, we propose a framework that supports the deployment of multiple PKI enhancements, with the ability to accommodate new, yet unforeseen, enhancements in the future. To enable mass adoption, we enlist the cloud as a "centralized" location where multiple enhancements can be accessed with high availability. Our approach is compatible with existing protocols and networking practices, with the ambition that a few changes will enable sustainable evolution for PKI enhancements. We provide extensive evaluation to show that the approach is scalable, cost-effective, and does not degrade communication performance. As a use case, we implement and evaluate two PKI enhancements.
引用
收藏
页码:637 / 649
页数:13
相关论文
共 50 条
  • [21] Utilizing national public-key infrastructure in mobile payment systems
    Hassinen, Marko
    Hyppoenen, Konstantin
    Trichina, Elena
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2008, 7 (02) : 214 - 231
  • [22] Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure
    Gomes, Fernanda Oliveira
    Agostinho, Bruno Machado
    Martina, Jean Everson
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 98 - 103
  • [23] ECPV: Efficient certificate path validation in public-key infrastructure
    Halappanavar, M
    Mukkamala, R
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 215 - 228
  • [24] Towards an FPGA architecture optimized for public-key algorithms
    Elbirt, AJ
    Paar, C
    RECONFIGURABLE TECHNOLOGY: FPGAS FOR COMPUTING AND APPLICATIONS, 1999, 3844 : 33 - 42
  • [25] Towards logically and physically secure public-key infrastructures
    Viswanathan, K
    Saxena, A
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134
  • [26] Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things
    Samia Belattaf
    Mohamed Mohammedi
    Mawloud Omar
    Rachida Aoudjit
    Wireless Personal Communications, 2021, 120 : 113 - 137
  • [27] New security protocol for mobile agent based on public-key infrastructure
    Mazlan, MA
    Dibba, M
    Samsudin, A
    Kamarulhali, H
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 96 - 101
  • [28] QPKI: A QoS-based architecture for public-key infrastructure (PKI)
    Mukkamala, R
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 108 - 121
  • [29] A public-key infrastructure for key i)istribution in TinyOS based on elliptic curve cryptography
    Malan, DJ
    Welsh, M
    Smith, MD
    2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 71 - 80
  • [30] Electronic flow document in the university environment using public-key infrastructure
    Holy, Radek
    Kalika, Marek
    Voparil, Lukas
    2015 International Symposium on Next-Generation Electronics (ISNE), 2015,