Visible to the public Trustful: A Decentralized Public Key Infrastructure and Identity Management System

TitleTrustful: A Decentralized Public Key Infrastructure and Identity Management System
Publication TypeConference Paper
Year of Publication2020
AuthorsDua, Amit, Barpanda, Siddharth Sekhar, Kumar, Neeraj, Tanwar, Sudeep
Conference Name2020 IEEE Globecom Workshops GC Wkshps
Date PublishedDec. 2020
PublisherIEEE
ISBN Number978-1-7281-7307-8
Keywordsblockchain, composability, decentralized PKI, Human Behavior, Identity management, identity management systems, Internet, Metrics, PKI, PKI Trust Models, pubcrawl, Public key, resilience, Resiliency, Scalability, security, smart contract, smart contracts, sockets, web of trust
Abstract

Modern Internet TCP uses Secure Sockets Layers (SSL)/Transport Layer Security (TLS) for secure communication, which relies on Public Key Infrastructure (PKIs) to authenticate public keys. Conventional PKI is done by Certification Authorities (CAs), issuing and storing Digital Certificates, which are public keys of users with the users identity. This leads to centralization of authority with the CAs and the storage of CAs being vulnerable and imposes a security concern. There have been instances in the past where CAs have issued rogue certificates or the CAs have been hacked to issue malicious certificates. Motivated from these facts, in this paper, we propose a method (named as Trustful), which aims to build a decentralized PKI using blockchain. Blockchains provide immutable storage in a decentralized manner and allows us to write smart contracts. Ethereum blockchain can be used to build a web of trust model where users can publish attributes, validate attributes about other users by signing them and creating a trust store of users that they trust. Trustful works on the Web-of-Trust (WoT) model and allows for any entity on the network to verify attributes about any other entity through a trusted network. This provides an alternative to the conventional CA-based identity verification model. The proposed model has been implemented and tested for efficacy and known major security attacks.

URLhttps://ieeexplore.ieee.org/document/9367444
DOI10.1109/GCWkshps50303.2020.9367444
Citation Keydua_trustful_2020