Veritaa: A distributed public key infrastructure with signature store
نویسندگان
چکیده
Summary Today, the integrity and authenticity of digital documents data are often hard to verify. Existing public key infrastructures (PKIs) capable certifying identities but do not provide solutions store signatures immutably, process certification is transparent. We propose Veritaa, a distributed infrastructure with an integrated signature (DPKISS). The central part Veritaa Graph Trust that manages identity claims singed declarations between document identifiers. An application‐specific ledger used transactions form immutably. For claims, reputation system based on signed trust domain vetting used. In this work, we have designed implemented proposed architecture created testbed, performed several experiments. experiments show benefits high performance Veritaa.
منابع مشابه
The Internet public key infrastructure
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...
متن کاملTrust and Public Key Infrastructure
In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users to exchange information and money securely over the Internet, is essential. Unfortunately, Internet is mere a cloud of connections of nodes. There is no organization to operate and manage. So the Internet itself is not responsible for any malicious frauds and attacks, and failures caused by reliab...
متن کاملA Public Key Infrastructure for User Identification
While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the netw...
متن کاملModelling a Public - Key Infrastructure 1
A global public-key infrastructure (PKI), components of which are emerging in the near future, is a prerequisite for security in distributed systems and for electronic commerce. The purpose of this paper is to propose an approach to modelling and reasoning about a PKI from a user Alice's point of view. Her view, from which she draws conclusions about the authenticity of other entities' public k...
متن کاملAuthenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Management
سال: 2021
ISSN: ['1055-7148', '1099-1190']
DOI: https://doi.org/10.1002/nem.2183