Veritaa: A distributed public key infrastructure with signature store

نویسندگان

چکیده

Summary Today, the integrity and authenticity of digital documents data are often hard to verify. Existing public key infrastructures (PKIs) capable certifying identities but do not provide solutions store signatures immutably, process certification is transparent. We propose Veritaa, a distributed infrastructure with an integrated signature (DPKISS). The central part Veritaa Graph Trust that manages identity claims singed declarations between document identifiers. An application‐specific ledger used transactions form immutably. For claims, reputation system based on signed trust domain vetting used. In this work, we have designed implemented proposed architecture created testbed, performed several experiments. experiments show benefits high performance Veritaa.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Internet public key infrastructure

Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...

متن کامل

Trust and Public Key Infrastructure

In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users to exchange information and money securely over the Internet, is essential. Unfortunately, Internet is mere a cloud of connections of nodes. There is no organization to operate and manage. So the Internet itself is not responsible for any malicious frauds and attacks, and failures caused by reliab...

متن کامل

A Public Key Infrastructure for User Identification

While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the netw...

متن کامل

Modelling a Public - Key Infrastructure 1

A global public-key infrastructure (PKI), components of which are emerging in the near future, is a prerequisite for security in distributed systems and for electronic commerce. The purpose of this paper is to propose an approach to modelling and reasoning about a PKI from a user Alice's point of view. Her view, from which she draws conclusions about the authenticity of other entities' public k...

متن کامل

Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure

Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Management

سال: 2021

ISSN: ['1055-7148', '1099-1190']

DOI: https://doi.org/10.1002/nem.2183