Publication:
Efficient key authentication service for secure end-to-end communications

dc.contributor.coauthorN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentN/A
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuauthorEtemad, Mohammad
dc.contributor.kuprofileFaculty Member
dc.contributor.kuprofilePhD Student
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.yokid168060
dc.contributor.yokidN/A
dc.date.accessioned2024-11-09T22:57:48Z
dc.date.issued2015
dc.description.abstractAfter four decades of public key cryptography, both the industry and academia seek better solutions for the public key infrastructure. A recent proposal, the certificate transparency concept, tries to enable untrusted servers act as public key servers, such that any key owner can verify that her key is kept properly at those servers. Unfortunately, due to high computation and communication requirements, existing certificate transparency proposals fail to address the problem as a whole. We propose a new efficient key authentication service (KAS). It uses server-side gossiping as the source of trust, and assumes servers are not all colluding. KAS stores all keys of each user in a separate hash chain, and always shares the last ring of the chain among the servers, ensuring the users that all servers provide the same view about them (i.e., no equivocation takes place). Storing users’ keys separately reduces the server and client computation and communication dramatically, making our KAS a very efficient way of public key authentication. The KAS handles a key registration/change operation in O(1) time using only O(1) proof size; independent of the number of users. While the previous best proposal, CONIKS, requires the client to download 100 KB of proof per day, our proposal needs less than 1 KB of proof per key lifetime, while obtaining the same probabilistic guarantees as CONIKS.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.volume9451
dc.identifier.doi10.1007/978-3-319-26059-4_10
dc.identifier.issn0302-9743
dc.identifier.linkhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84948757823anddoi=10.1007%2f978-3-319-26059-4_10andpartnerID=40andmd5=2b059dbe7b44af03686e6a3aba24f337
dc.identifier.quartileQ4
dc.identifier.scopus2-s2.0-84948757823
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-319-26059-4_10
dc.identifier.urihttps://hdl.handle.net/20.500.14288/7611
dc.identifier.wos375153000010
dc.keywordsCertificate transparency
dc.keywordsEnd-to-end encryption
dc.keywordsAuthentication
dc.keywordsChains
dc.keywordsPublic key cryptography
dc.keywordsTransparency
dc.keywordsEnd-to-end communication
dc.keywordsEnd-to-end encryption
dc.keywordsKey authentication
dc.keywordsProbabilistic guarantees
dc.keywordsPublic key authentication
dc.keywordsPublic key infrastructure
dc.keywordsServer sides
dc.keywordsUntrusted server
dc.keywordsCryptography
dc.languageEnglish
dc.publisherSpringer
dc.sourceLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.subjectComputer engineering
dc.titleEfficient key authentication service for secure end-to-end communications
dc.typeBook Chapter
dspace.entity.typePublication
local.contributor.authorid0000-0003-2099-2206
local.contributor.authoridN/A
local.contributor.kuauthorKüpçü, Alptekin
local.contributor.kuauthorEtemad, Mohammad
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files