Skip to main content

Showing 1–9 of 9 results for author: Chuat, L

Searching in archive cs. Search in all archives.
.
  1. F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure

    Authors: Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig

    Abstract: We present F-PKI, an enhancement to the HTTPS public-key infrastructure (or web PKI) that gives trust flexibility to both clients and domain owners, and enables certification authorities (CAs) to enforce stronger security measures. In today's web PKI, all CAs are equally trusted, and security is defined by the weakest link. We address this problem by introducing trust flexibility in two dimensions… ▽ More

    Submitted 29 March, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

    Comments: Network and Distributed System Security Symposium (NDSS) 2022

  2. arXiv:2009.10664  [pdf, ps, other

    cs.DC cs.CR

    A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance

    Authors: Joel Wanner, Laurent Chuat, Adrian Perrig

    Abstract: Byzantine fault tolerant protocols enable state replication in the presence of crashed, malfunctioning, or actively malicious processes. Designing such protocols without the assistance of verification tools, however, is remarkably error-prone. In an adversarial environment, performance and flexibility come at the cost of complexity, making the verification of existing protocols extremely difficult… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

    Comments: International Symposium on Reliable Distributed Systems (SRDS) 2020

  3. Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come

    Authors: Laurent Chuat, Sarah Plocher, Adrian Perrig

    Abstract: User authentication can rely on various factors (e.g., a password, a cryptographic key, biometric data) but should not reveal any secret or private information. This seemingly paradoxical feat can be achieved through zero-knowledge proofs. Unfortunately, naive password-based approaches still prevail on the web. Multi-factor authentication schemes address some of the weaknesses of the traditional l… ▽ More

    Submitted 17 December, 2019; v1 submitted 29 July, 2019; originally announced July 2019.

    Comments: International Workshop on Security Protocols (SPW) 2019

  4. SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

    Authors: Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig

    Abstract: The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems. These problems are exacerbated by the lack of a native delegation mechanism in TLS, which increasingly leads domain owners to engage in dangerous practices such as sharing t… ▽ More

    Submitted 20 April, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: IEEE European Symposium on Security and Privacy (EuroS&P) 2020

  5. BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure

    Authors: Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig

    Abstract: This paper describes BlockPKI, a blockchain-based public-key infrastructure that enables an automated, resilient, and transparent issuance of digital certificates. Our goal is to address several shortcomings of the current TLS infrastructure and its proposed extensions. In particular, we aim at reducing the power of individual certification authorities and make their actions publicly visible and a… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Comments: Workshop on Blockchain and Sharing Economy Applications

  6. Deadline-Aware Multipath Communication: An Optimization Problem

    Authors: Laurent Chuat, Adrian Perrig, Yih-Chun Hu

    Abstract: Multipath communication not only allows improved throughput but can also be used to leverage different path characteristics to best fulfill each application's objective. In particular, certain delay-sensitive applications, such as real time voice and video communications, can usually withstand packet loss and aim to maximize throughput while kee** latency at a reasonable level. In such a context… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

    Comments: IEEE/IFIP DSN 2017

  7. RITM: Revocation in the Middle

    Authors: Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig

    Abstract: Although TLS is used on a daily basis by many critical applications, the public-key infrastructure that it relies on still lacks an adequate revocation mechanism. An ideal revocation mechanism should be inexpensive, efficient, secure, and privacy-preserving. Moreover, rising trends in pervasive encryption pose new scalability challenges that a modern revocation system should address. In this paper… ▽ More

    Submitted 30 August, 2016; v1 submitted 28 April, 2016; originally announced April 2016.

    Comments: ICDCS 2016, Best Paper Award

  8. PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem

    Authors: Pawel Szalachowski, Laurent Chuat, Adrian Perrig

    Abstract: In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy. A few certification authorities (CAs) are currently responsible for the issuance of the large majority of TLS certificates. These certificates are considered valid only if the certificate… ▽ More

    Submitted 1 February, 2016; v1 submitted 15 January, 2016; originally announced January 2016.

    Comments: IEEE EuroS&P 2016

  9. Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs

    Authors: Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri

    Abstract: The level of trust accorded to certification authorities has been decreasing over the last few years as several cases of misbehavior and compromise have been observed. Log-based approaches, such as Certificate Transparency, ensure that fraudulent TLS certificates become publicly visible. However, a key element that log-based approaches still lack is a way for clients to verify that the log behaves… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

    Comments: 9 pages, 5 figures