首页> 外文会议>European Symposium on Research in Computer Security >Secure Logging Schemes and Certificate Transparency
【24h】

Secure Logging Schemes and Certificate Transparency

机译:安全的记录方案和证书透明度

获取原文

摘要

Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain. Certificate Transparency (CT) is a recent standard by the Internet Engineering Task Force (IETF) that aims to construct public logs of all certificates issued by CAs, making it easier for domain owners to monitor for fraudulently issued certificates. To avoid relying on trusted log servers, CT includes mechanisms by which monitors and auditors can check whether logs are behaving honestly or not; these mechanisms are primarily based on Merkle tree hashing and authentication proofs. Given that CT is now being deployed, it is important to verify that it achieves its security goals. In this work, we define four security properties of logging schemes such as CT that can be assured via cryptographic means, and show that CT does achieve these security properties. We consider two classes of security goals: those involving security against a malicious logger attempting to present different views of the log to different parties or at different points in time, and those involving security against malicious monitors who attempt to frame an honest log for failing to include a certificate in the log. We show that Certificate Transparency satisfies these security properties under various assumptions on Merkle trees all of which reduce to collision resistance of the underlying hash function (and in one case with the additional assumption of unforgeable signatures).
机译:由于数百个证书颁发机构(CAS)可以发出浏览器可信证书,因此域所有者可能很难检测已为其域发出欺诈性发出的证书。证书透明度(CT)是近来的互联网工程任务组(IETF)的标准,旨在构造CAS发出的所有证书的公共日志,使域名更容易监控欺诈性发出的证书。为避免依靠受信任的日志服务器,CT包括监视器和审计师可以检查日志是否诚实行为的机制;这些机制主要基于Merkle树散列和认证证明。鉴于CT现在正在部署,重要的是验证它是否达到了安全目标。在这项工作中,我们定义了4个记录方案的安全性属性,例如可以通过加密手段确保的CT,并显示CT确实实现了这些安全性。我们考虑了两类安全目标:涉及对恶意记录器的安全性的人试图将日志的不同视图与不同方面的不同观点呈现出不同的时间点,以及涉及试图框架的恶意监视器的安全性的人员,他们试图框架失败在日志中包含证书。我们显示证书透明度在Merkle树上的各种假设下满足这些安全性属性,所有这些安全性都可以减少底层哈希函数的碰撞电阻(并且在一个情况下,在一个情况下,额外的不可受动签名的额外假设)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号