Cryptology ePrint Archive: Report 2013/595
Enhanced certificate transparency and end-to-end encrypted mail
Mark D. Ryan
Abstract: The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend "certificate transparency}", a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using PKI with no requirement to trust certificate authorities, or to rely on complex peer-to-peer key-signing arrangements such as PGP. This makes end-to-end encrypted mail possible, with apparently few additional usability issues compared to unencrypted mail (specifically, users do not need to understand or concern themselves with keys or certificates). Underlying these ideas is a new attacker model appropriate for cloud computing, which we call "malicious-but-cautious".
Category / Keywords: PKI; public key certificates; email security
Original Publication (with major differences): Network and Distributed System Security (NDSS) 2014
Date: received 13 Sep 2013, last revised 16 Dec 2013
Contact author: m d ryan at cs bham ac uk
Available format(s): PDF | BibTeX Citation
Version: 20131216:144259 (All versions of this report)
Short URL: ia.cr/2013/595
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]