Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2016/452

Secure Logging Schemes and Certificate Transparency

Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila

Abstract

Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain. Certificate Transparency (CT) is a recent standard by the Internet Engineering Task Force (IETF) that aims to construct public logs of all certificates issued by CAs, making it easier for domain owners to monitor for fraudulently issued certificates. To avoid relying on trusted log servers, CT includes mechanisms by which monitors and auditors can check whether logs are behaving honestly or not; these mechanisms are primarily based on Merkle tree hashing and authentication proofs. Given that CT is now being deployed, it is important to verify that it achieves its security goals. In this work, we define four security properties of logging schemes such as CT that can be assured via cryptographic means, and show that CT does achieve these security properties. We consider two classes of security goals: those involving security against a malicious logger attempting to present different views of the log to different parties or at different points in time, and those involving security against malicious monitors who attempt to frame an honest log for failing to include a certificate in the log. We show that Certificate Transparency satisfies these security properties under various assumptions on Merkle trees all of which reduce to collision resistance of the underlying hash function (and in one case with the additional assumption of unforgeable signatures).

Note: Full version of paper in proceedings of ESORICS 2016.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Major revision. ESORICS 2016
Keywords
Certificate Transparencypublic key infrastructures (PKI)logging schemesMerkle trees
Contact author(s)
stebilad @ mcmaster ca
History
2016-09-23: revised
2016-05-10: received
See all versions
Short URL
https://ia.cr/2016/452
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/452,
      author = {Benjamin Dowling and Felix Günther and Udyani Herath and Douglas Stebila},
      title = {Secure Logging Schemes and Certificate Transparency},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/452},
      year = {2016},
      url = {https://eprint.iacr.org/2016/452}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.