Cecoin: A decentralized PKI mitigating MitM attacks

被引:61
作者
Qin, Bo [1 ]
Huang, Jikun [1 ]
Wang, Qin [2 ]
Luo, Xizhao [3 ]
Liang, Bin [1 ]
Shi, Wenchang [1 ]
机构
[1] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Beijing, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 107卷
关键词
PKI; Blockchain; Decentralized consensus;
D O I
10.1016/j.future.2017.08.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner. However, due to the centralized architecture, it raises the single-point failure problem with unpredictable threats. In this paper, we present a distributed certificate scheme, referred to as Cecoin which is inspired by the well-known Bitcoin by employing its irreversible unforgeability and public verifiability. In Cecoin, the certificates can be treated as currencies and recorded on block chain, which removes the single point failure problem. The miners can verify the validity of certificates following a set of rules to ensure ownership consistency, and allow an identity to bind multiple public-key certificates. For efficient retrieval and verification of certificates, and quick operations, we incorporate the modified Merkle Patricia tree and employ it to implement a distributed Certificate Library. To allow the owner to transfer the possession of identity, we design an online fair exchange protocol without a trusted third party. Security and efficiency analyses show that our Cecoin provides strong security with desirable efficiency. (c) 2017 Published by Elsevier B.V.
引用
收藏
页码:805 / 815
页数:11
相关论文
共 34 条
[11]  
Cachin C., Architecture of the Hyperledger Blockchain Fabric
[12]   Man-in-the-Middle Attack to the HTTPS Protocol [J].
Callegati, Franco ;
Cerroni, Walter ;
Ramilli, Marco .
IEEE SECURITY & PRIVACY, 2009, 7 (01) :78-81
[13]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[14]  
Christensen NL, 1997, ECOSYSTEM FUNCTION AND HUMAN ACTIVITIES, P1
[15]  
Fromknecht C., CERTCOIN NAMECOIN BA
[16]  
Fromknecht C, 2014, IACR CRYPTOLOGY EPRI, V2014, P803
[17]  
Haber S., 1991, Journal of Cryptology, V3, P99, DOI 10.1007/BF00196791
[18]  
Housley R., 2002, TECHNICAL REPORT
[19]   Optimistic Fair-Exchange with Anonymity for Bitcoin Users [J].
Jayasinghe, Danushka ;
Markantonakis, Konstantinos ;
Mayes, Keith .
2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, :44-51
[20]  
Kalodner H.A., 2015, WEIS, V1, P1