A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
The certificates of these important CAs are effectively too big to be revoked, as revoking them would result in massive collateral damage. ... To solve this problem, we redesign the current revocation system with a novel approach that we call PKI Safety Net (PKISN), which uses publicly accessible logs to store certificates (in the spirit of Certificate ... Acknowledgments We thank our shepherd Bart Preneel, the anonymous reviewers, and Franz Saller for their valuable feedback. ...doi:10.1109/eurosp.2016.38 dblp:conf/eurosp/SzalachowskiCP16 fatcat:xnrnmtgaoffcxkfrq5ig5ozuyq
To distribute the trust and mitigate the threats and security issues of current PKI, publicly verifiable log-based approaches have been proposed. ... However, still, these schemes have vulnerabilities and inefficiency problems due to lack of specifying proper monitoring, data structure, and extra latency. ... Acknowledgments This work is partially supported by China National Key Research and Development Program no. 2016YFB0800301 and National Natural Science Foundation of China "NSFC" no. 61300177. ...doi:10.1155/2018/8527010 fatcat:shkp4rwzmvc23jgxiohuri26vu