Cecoin: A decentralized PKI mitigating MitM attacks

被引:61
作者
Qin, Bo [1 ]
Huang, Jikun [1 ]
Wang, Qin [2 ]
Luo, Xizhao [3 ]
Liang, Bin [1 ]
Shi, Wenchang [1 ]
机构
[1] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Beijing, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 107卷
关键词
PKI; Blockchain; Decentralized consensus;
D O I
10.1016/j.future.2017.08.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner. However, due to the centralized architecture, it raises the single-point failure problem with unpredictable threats. In this paper, we present a distributed certificate scheme, referred to as Cecoin which is inspired by the well-known Bitcoin by employing its irreversible unforgeability and public verifiability. In Cecoin, the certificates can be treated as currencies and recorded on block chain, which removes the single point failure problem. The miners can verify the validity of certificates following a set of rules to ensure ownership consistency, and allow an identity to bind multiple public-key certificates. For efficient retrieval and verification of certificates, and quick operations, we incorporate the modified Merkle Patricia tree and employ it to implement a distributed Certificate Library. To allow the owner to transfer the possession of identity, we design an online fair exchange protocol without a trusted third party. Security and efficiency analyses show that our Cecoin provides strong security with desirable efficiency. (c) 2017 Published by Elsevier B.V.
引用
收藏
页码:805 / 815
页数:11
相关论文
共 34 条
[1]  
Abdul-Rahman A., 1997, EDI-Forum: J. Electron. Commerce, V10, P27
[2]  
Adams C., 1999, Understanding public-key infrastructure: concepts, standards, and deployment considerations
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
[Anonymous], Tendermint: Consensus without mining (v0.6)
[5]  
[Anonymous], 2004, Ad Hoc Wireless Networks: Architectures and Protocols
[6]  
Back A., 2002, Hashcash-A Denial of Service Counter-Measure
[7]  
Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Buterin V., Ethereum: A next-generation smart contract and decentralized application platform
[10]  
C. Comodo Ltd, 2011, TECHNICAL REPORT