Cryptology ePrint Archive: Report 2013/595

Enhanced certificate transparency and end-to-end encrypted mail

Mark D. Ryan

Abstract: The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend "certificate transparency}", a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using PKI with no requirement to trust certificate authorities, or to rely on complex peer-to-peer key-signing arrangements such as PGP. This makes end-to-end encrypted mail possible, with apparently few additional usability issues compared to unencrypted mail (specifically, users do not need to understand or concern themselves with keys or certificates). Underlying these ideas is a new attacker model appropriate for cloud computing, which we call "malicious-but-cautious".

Category / Keywords: PKI; public key certificates; email security

Original Publication (with major differences): Network and Distributed System Security (NDSS) 2014

Date: received 13 Sep 2013, last revised 16 Dec 2013

Contact author: m d ryan at cs bham ac uk

Available format(s): PDF | BibTeX Citation

Version: 20131216:144259 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]