Publication:
Efficient key authentication service for secure end-to-end communications

dc.contributor.coauthorN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.kuauthorEtemad, Mohammad
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-09T22:57:48Z
dc.date.issued2015
dc.description.abstractAfter four decades of public key cryptography, both the industry and academia seek better solutions for the public key infrastructure. A recent proposal, the certificate transparency concept, tries to enable untrusted servers act as public key servers, such that any key owner can verify that her key is kept properly at those servers. Unfortunately, due to high computation and communication requirements, existing certificate transparency proposals fail to address the problem as a whole. We propose a new efficient key authentication service (KAS). It uses server-side gossiping as the source of trust, and assumes servers are not all colluding. KAS stores all keys of each user in a separate hash chain, and always shares the last ring of the chain among the servers, ensuring the users that all servers provide the same view about them (i.e., no equivocation takes place). Storing users’ keys separately reduces the server and client computation and communication dramatically, making our KAS a very efficient way of public key authentication. The KAS handles a key registration/change operation in O(1) time using only O(1) proof size; independent of the number of users. While the previous best proposal, CONIKS, requires the client to download 100 KB of proof per day, our proposal needs less than 1 KB of proof per key lifetime, while obtaining the same probabilistic guarantees as CONIKS.
dc.description.indexedbyWOS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuN/A
dc.description.volume9451
dc.identifier.doi10.1007/978-3-319-26059-4_10
dc.identifier.issn0302-9743
dc.identifier.quartileQ4
dc.identifier.scopus2-s2.0-84948757823
dc.identifier.urihttps://doi.org/10.1007/978-3-319-26059-4_10
dc.identifier.urihttps://hdl.handle.net/20.500.14288/7611
dc.identifier.wos375153000010
dc.keywordsCertificate transparency
dc.keywordsEnd-to-end encryption
dc.keywordsAuthentication
dc.keywordsChains
dc.keywordsPublic key cryptography
dc.keywordsTransparency
dc.keywordsEnd-to-end communication
dc.keywordsEnd-to-end encryption
dc.keywordsKey authentication
dc.keywordsProbabilistic guarantees
dc.keywordsPublic key authentication
dc.keywordsPublic key infrastructure
dc.keywordsServer sides
dc.keywordsUntrusted server
dc.keywordsCryptography
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.subjectComputer engineering
dc.titleEfficient key authentication service for secure end-to-end communications
dc.typeBook Chapter
dspace.entity.typePublication
local.contributor.kuauthorKüpçü, Alptekin
local.contributor.kuauthorEtemad, Mohammad
local.publication.orgunit1College of Engineering
local.publication.orgunit1GRADUATE SCHOOL OF SCIENCES AND ENGINEERING
local.publication.orgunit2Department of Computer Engineering
local.publication.orgunit2Graduate School of Sciences and Engineering
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files