CONIKS: Bringing Key Transparency to End Users

  title={CONIKS: Bringing Key Transparency to End Users},
  author={Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman},
  booktitle={USENIX Security Symposium},
Public keys must be distributed securely even in the presence of attackers. This is known as the Public Key Infrastructure problem or PKI. This problem arises in applications such as secure messaging and web surfing/https where a man in the middle can intercept public keys and return erroneous public keys. Secure communication today depends on placing trust in a few centralized certificate authorities via SSL/TLS protocols depicted below for completeness. However, an attacker can take advantage… CONTINUE READING
Highly Influential
This paper has highly influenced 16 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 115 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 68 extracted citations

116 Citations

Citations per Year
Semantic Scholar estimates that this publication has 116 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 53 references

Apple’s iMessage Encryption Seems to Be Pretty Good

  • B. Schneier
  • archives/2013/04…
  • 2015
1 Excerpt

Upgrading HTTPS in midair: HSTS and key pinning in practice

  • M. Kranch, J. Bonneau
  • NDSS,
  • 2015
1 Excerpt

Analysis of a proposed hash-based signature standard

  • J. Katz
  • papers…
  • 2014
1 Excerpt

CONIKS: Preserving Secure Communication with Untrusted Identity Providers

  • M. S. Melara
  • Master’s thesis, Princeton University, Jun
  • 2014
1 Excerpt

Gmail does scan all emails, new Google terms clarify

  • S. Gibbs
  • The Guardian, Apr.
  • 2014
1 Excerpt


  • M. Krohn, C. Coyne
  • https://keybase. io, Retr. Feb.
  • 2014
1 Excerpt

Similar Papers

Loading similar papers…