Abstract
PKI schemes provide a critical foundation for applied cryptographic protocols. However, there are no rigorous security specifications for realistic PKI schemes, and therefore, no PKI schemes were proven secure. Cryptographic systems that use PKI are analyzed by adopting overly simplified models of PKI, often simply assuming securely-distributed public keys. This is problematic given the extensive reliance on PKI, the multiple failures of PKI systems, and the complexity of both proposed and deployed systems, which involve complex requirements and models. We present game-based security specifications for PKI schemes and analyze important and widely deployed PKIs: PKIX and two variants of Certificate Transparency (CT). These PKIs are based on the X.509v3 standard and its CRL revocation mechanism. Our analysis identified a few subtle vulnerabilities and provides reduction-based proofs showing that the PKIs ensure specific requirements under specific models (assumptions). To our knowledge, this is the first reduction-based proof of security for a realistic PKI scheme, e.g., supporting certificate chains.
| Original language | English |
|---|---|
| Title of host publication | CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 1552-1566 |
| Number of pages | 15 |
| ISBN (Electronic) | 9798400706363 |
| DOIs | |
| State | Published - 9 Dec 2024 |
| Externally published | Yes |
| Event | 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 - Salt Lake City, United States Duration: 14 Oct 2024 → 18 Oct 2024 |
Publication series
| Name | CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security |
|---|
Conference
| Conference | 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 |
|---|---|
| Country/Territory | United States |
| City | Salt Lake City |
| Period | 14/10/24 → 18/10/24 |
Bibliographical note
Publisher Copyright:© 2024 Copyright held by the owner/author(s).
Keywords
- PKI
- provable-security