Managing Trusted Keys in Internet-Scale Systems
Bellevue, WA, 2009, Pages 153-156E.
This paper considers a fundamental problem facing all applications that rely on public key cryptography: how to obtain, verify, and maintain the set of trusted public keys. Without some notion of where to find the right keys or which keys can be trusted, an adversary can create false keys, trick users into accepting the false keys, and im...More
Get fulltext within 24h
Full Text (Upload PDF)
PPT (Upload PPT)