Revisiting Privacy-aware Blockchain Public Key Infrastructure

Paul Plessing, Olamide Omolola

Research output: Chapter in Book/Report/Conference proceedingConference paper

Abstract

Privacy-aware Blockchain Public Key Infrastructure (PB-PKI) is a recent proposal by Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain. However, PB-PKI suffers from operational problems. We found that the most important change, i.e., the key update process proposed in PB-PKI for privacy is broken. Other issues include authenticating a user during key update and ensuring proper key revocation. In this paper, we provide solutions to the problems of PB-PKI. We suggest generating fresh keys during key update. Furthermore, we use ring signatures for authenticating the user requesting key updates and use Asynchronous accumulators to handle the deletion of revoked keys. We show that the approach is feasible and implement a proof of concept.

Original languageEnglish
Title of host publicationICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy
EditorsSteven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp
PublisherSciTePress - Science and Technology Publications
Pages415-423
Number of pages9
Volume1
ISBN (Electronic)9789897583995
ISBN (Print)978-989-758-399-5
DOIs
Publication statusPublished - 1 Jan 2020
Event6th International Conference on Information Systems Security and Privacy: ICISSP 2020 - Valletta, Malta
Duration: 25 Feb 202027 Feb 2020

Publication series

NameICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy

Conference

Conference6th International Conference on Information Systems Security and Privacy
Abbreviated titleICISSP 2020
Country/TerritoryMalta
CityValletta
Period25/02/2027/02/20

Keywords

  • Blockchain
  • Privacy
  • Public key infrastructure
  • RSA

ASJC Scopus subject areas

  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Revisiting Privacy-aware Blockchain Public Key Infrastructure'. Together they form a unique fingerprint.

Cite this