{"title":"在基于区块链的公钥基础设施中增强隐私","authors":"Amalan Joseph Antony A, K. Singh","doi":"10.1109/ISEA-ISAP49340.2020.235005","DOIUrl":null,"url":null,"abstract":"With the increasing need for, and the popularity of asymmetric cryptosystems, the need for a secure and efficient means of disseminating authentic public keys in a closed network is also on the increase[1]. Blockchain technology has been proposed as a solution to the security problems in the conventional models of a Public Key Infrastructure, as it offers transparency in the issuance of certificates and eliminates single points of failure. Blockchain excludes manipulation by making it computationally infeasible to edit a public key once it is published, thereby facilitating frequent key-updates. But this raises a concern about two issues - privacy and the proof of ownership, and ensuring one excludes the other. To reconcile these two seemingly irreconcilable problems, we propose a new key generation and update procedure, which will enable an identity to update its key with privacy and also to flawlessly prove the ownership of its past keys. Elliptic Curve Cryptographic methods are incorporated to make the cryptosystem secure. Further, the existence check of identities is optimised using multiple instances of bloom filter probabilistic data structures.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Enhancing Privacy in a Blockchain-based Public Key Infrastructure\",\"authors\":\"Amalan Joseph Antony A, K. Singh\",\"doi\":\"10.1109/ISEA-ISAP49340.2020.235005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing need for, and the popularity of asymmetric cryptosystems, the need for a secure and efficient means of disseminating authentic public keys in a closed network is also on the increase[1]. Blockchain technology has been proposed as a solution to the security problems in the conventional models of a Public Key Infrastructure, as it offers transparency in the issuance of certificates and eliminates single points of failure. Blockchain excludes manipulation by making it computationally infeasible to edit a public key once it is published, thereby facilitating frequent key-updates. But this raises a concern about two issues - privacy and the proof of ownership, and ensuring one excludes the other. To reconcile these two seemingly irreconcilable problems, we propose a new key generation and update procedure, which will enable an identity to update its key with privacy and also to flawlessly prove the ownership of its past keys. Elliptic Curve Cryptographic methods are incorporated to make the cryptosystem secure. Further, the existence check of identities is optimised using multiple instances of bloom filter probabilistic data structures.\",\"PeriodicalId\":235855,\"journal\":{\"name\":\"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEA-ISAP49340.2020.235005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing Privacy in a Blockchain-based Public Key Infrastructure
With the increasing need for, and the popularity of asymmetric cryptosystems, the need for a secure and efficient means of disseminating authentic public keys in a closed network is also on the increase[1]. Blockchain technology has been proposed as a solution to the security problems in the conventional models of a Public Key Infrastructure, as it offers transparency in the issuance of certificates and eliminates single points of failure. Blockchain excludes manipulation by making it computationally infeasible to edit a public key once it is published, thereby facilitating frequent key-updates. But this raises a concern about two issues - privacy and the proof of ownership, and ensuring one excludes the other. To reconcile these two seemingly irreconcilable problems, we propose a new key generation and update procedure, which will enable an identity to update its key with privacy and also to flawlessly prove the ownership of its past keys. Elliptic Curve Cryptographic methods are incorporated to make the cryptosystem secure. Further, the existence check of identities is optimised using multiple instances of bloom filter probabilistic data structures.