Certification with multiple signatures
Document Type
Conference Proceeding
Publication Date
9-29-2015
Abstract
© 2015 ACM. Certificate Authority (CA) is a single point of failure in the design of Public Key Infrastructure (PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can be used by adversaries to issue rogue certifi- cates for any domains without the consent of the domain owners. These rogue certificates have been used in Man-inthe- Middle (MitM) attacks. Studies have been conducted to prevent and reduce the damages of breached CAs and rogue certificates in diferent ways. However, few have a mechanism to fully and eficiently verify whether a CA or a certificate can be trusted or not. There is a need to develop new methods to ensure certificates with a high level of trustworthy in order for the PKI to be more resistant to compromised CAs and rogue certificates. We propose an alternative approach to mitigate the issue of CA breaches by imposing multiple signatures on a server certificate. This is analogous with the redundancy approach that is commonly adopted in the practice of IT management. Since CAs are run and managed by independent organizations, the probability of breaking multiple CAs in a short period of time is reduced significantly. If S signatures are imposed on a certificate, the compromise of S - 1 CAs will not break the PKI system. In this paper, we describe a framework of our approach and analyze its security. We also provide a brief overview of the most relevant counter measures against CA breaches and rogue certificates.
Publication Title
RIIT 2015 - Proceedings of the 4th Annual ACM Conference on Research in Information Technology
Recommended Citation
Wang, X.,
Bai, Y.,
&
Hu, L.
(2015).
Certification with multiple signatures.
RIIT 2015 - Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 13-18.
http://doi.org/10.1145/2808062.2808068
Retrieved from: https://digitalcommons.mtu.edu/michigantech-p/12560