Trustworthy and Transparent Third Party Authority

A crucial component of emerging cryptographic schemes is a third-party authority (TPA) that must be trusted. However, several types of attacks and certificate mis-issuance problems in the CA infras...

[1]  Georg Carle,et al.  In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements , 2018, PAM.

[2]  Brent Waters,et al.  Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.

[3]  Christopher Krügel,et al.  Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates , 2018, NDSS.

[4]  Ueli Maurer,et al.  Strengthening Access Control Encryption , 2017, ASIACRYPT.

[5]  Dan Boneh,et al.  Threshold Cryptosystems From Threshold Fully Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..

[6]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[7]  Nishant Doshi,et al.  Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption , 2016 .

[8]  Ralf Sasse,et al.  Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure , 2016, IEEE Transactions on Dependable and Secure Computing.

[9]  Georg Carle,et al.  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem , 2018, Internet Measurement Conference.

[10]  Mark Ryan,et al.  DECIM: Detecting Endpoint Compromise In Messaging , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Scott Chacon,et al.  Pro Git , 2009, Apress.

[12]  Deepak Kumar,et al.  Tracking Certificate Misissuance in the Wild , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[13]  Ralph Holz,et al.  A First Look at Certification Authority Authorization (CAA) , 2018, CCRV.

[14]  Douglas Stebila,et al.  Secure Logging Schemes and Certificate Transparency , 2016, ESORICS.

[15]  Carl Nykvist,et al.  How Certificate Transparency Impact the Performance , 2017 .

[16]  Melissa Chase,et al.  Transparency Overlays and Applications , 2016, IACR Cryptol. ePrint Arch..

[17]  Brent Waters,et al.  Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.

[18]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[19]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[20]  Neal Leavitt,et al.  Internet Security under Attack: The Undermining of Digital Certificates , 2011, Computer.

[21]  Ivan Damgård,et al.  Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[22]  Jing Chen,et al.  CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[23]  Vinod Vaikuntanathan,et al.  Predicate Encryption for Circuits from LWE , 2015, CRYPTO.

[24]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[25]  Brent Waters,et al.  Functional Encryption: Definitions and Challenges , 2011, TCC.

[26]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[27]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[28]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.

[29]  Brent Waters,et al.  Functional Encryption for Regular Languages , 2012, CRYPTO.

[30]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[31]  Mark Ryan,et al.  Enhanced Certificate Transparency and End-to-End Encrypted Mail , 2014, NDSS.

[32]  Dan Boneh,et al.  IRON: Functional Encryption using Intel SGX , 2017, CCS.

[33]  Marco Chiesa,et al.  Analysis of Country-Wide Internet Outages Caused by Censorship , 2014, IEEE/ACM Transactions on Networking.

[34]  Melissa Chase,et al.  FAME: Fast Attribute-based Message Encryption , 2017, CCS.

[35]  Ben Laurie Certificate Transparency , 2014, ACM Queue.

[36]  Adrian Perrig,et al.  Efficient gossip protocols for verifying the consistency of Certificate logs , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[37]  Dan Boneh,et al.  Certificate Transparency with Privacy , 2017, Proc. Priv. Enhancing Technol..