Towards Sustainable Evolution for the TLS Public-Key Infrastructure

被引:2
作者
Lee, Taeho [1 ]
Pappas, Christos [1 ]
Szalachowski, Pawel [2 ]
Perrig, Adrian [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] SUTD, Singapore, Singapore
来源
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18) | 2018年
基金
欧洲研究理事会;
关键词
D O I
10.1145/3196494.3196520
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one particular enhancement is no panacea, since each one solves only a subset of the problems. At the same time, the high deployment barrier makes the benefit-cost ratio tilt in the wrong direction, leading to disappointing adoption rates for most proposals. As a way to escape from this conundrum, we propose a framework that supports the deployment of multiple PKI enhancements, with the ability to accommodate new, yet unforeseen, enhancements in the future. To enable mass adoption, we enlist the cloud as a "centralized" location where multiple enhancements can be accessed with high availability. Our approach is compatible with existing protocols and networking practices, with the ambition that a few changes will enable sustainable evolution for PKI enhancements. We provide extensive evaluation to show that the approach is scalable, cost-effective, and does not degrade communication performance. As a use case, we implement and evaluate two PKI enhancements.
引用
收藏
页码:637 / 649
页数:13
相关论文
共 50 条
  • [41] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [42] Design, Analysis, and Implementation of ARPKI An Attack-Resilient Public-Key Infrastructure
    Basin, David
    Cremers, Cas
    Kim, Tiffany Hyun-Jin
    Perrig, Adrian
    Sasse, Ralf
    Szalachowski, Pawel
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 393 - 408
  • [43] Public-Key Infrastructure for the secure Border Gateway Protocol (S-BGP)
    Seo, K
    Lynn, C
    Kent, S
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 239 - 253
  • [44] Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol
    Vijayan, Rajilal Manathala
    Ezhilarasie, R.
    Umamakeswari, A.
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1029 - 1037
  • [45] PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density
    Ping, Yuan
    Wang, Baocang
    Tian, Shengli
    Zhou, Jingxian
    Ma, Hui
    [J]. INFORMATION, 2019, 10 (02)
  • [46] An efficient public-key framework
    Zhou, JY
    Bao, F
    Deng, R
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 88 - 99
  • [47] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [48] The cubic public-key transformation
    Kak, Subhash
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2007, 26 (03) : 353 - 359
  • [49] Coalition public-key cryptosystems
    Anisimov A.V.
    [J]. Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [50] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2