Decentralizing Authorities into Scalable Strongest-Link Cothorities

@article{Syta2015DecentralizingAI,
  title={Decentralizing Authorities into Scalable Strongest-Link Cothorities},
  author={Ewa Syta and Iulia Tamas and Dylan Visher and David Wolinsky and Bryan Ford},
  journal={ArXiv},
  year={2015},
  volume={abs/1503.08768}
}
Online infrastructure often depends on security-critical authorities such as logging, time, and certificate services. Authorities, however, are vulnerable to the compromise of one or a few centralized hosts yielding "weakest-link" security. We propose collective authorities or cothorities, an architecture enabling thousands of participants to witness, validate, and co-sign an authority's public actions, with moderate delays and costs. Hosts comprising a cothority form an efficient communication… CONTINUE READING

Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 63 REFERENCES

Certificate transparency

  • Commun. ACM
  • 2014
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Another fraudulent certificate raises the same old questions about certificate authorities

P. Bright
  • arstechnica,
  • 2011
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

DigiNotar SSL certificate hack amounts to cyberwar, says expert

C. Arthur
  • The Guardian,
  • 2011
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Multi-signatures in the plain public-Key model and a general forking lemma

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

How to time-stamp a digital document

  • Journal of Cryptology
  • 1991
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Maintaining digital certificate security

A. Langley
  • Google Online Security Blog,
  • 2015
VIEW 1 EXCERPT

ARPKI: Attack Resilient Public-Key Infrastructure

  • ACM Conference on Computer and Communications Security
  • 2014
VIEW 2 EXCERPTS

Certificate transparency , June 2013

T. Moscibroda
  • ACM Queue
  • 2014