Skip to main content

Showing 1–38 of 38 results for author: Szalachowski, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.00940  [pdf, other

    cs.CR cs.DC

    Maximal Extractable Value (MEV) Protection on a DAG

    Authors: Dahlia Malkhi, Pawel Szalachowski

    Abstract: Many cryptocurrency platforms are vulnerable to Maximal Extractable Value (MEV) attacks, where a malicious consensus leader can inject transactions or change the order of user transactions to maximize its profit. A promising line of research in MEV mitigation is to enhance the Byzantine fault tolerance (BFT) consensus core of blockchains by new functionalities, like hiding transaction contents, su… ▽ More

    Submitted 23 December, 2022; v1 submitted 1 August, 2022; originally announced August 2022.

  2. arXiv:2109.07316  [pdf, other

    cs.NI cs.CR cs.DC stat.AP

    Reinshard: An optimally sharded dual-blockchain for concurrency resolution

    Authors: Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou

    Abstract: Decentralized control, low-complexity, flexible and efficient communications are the requirements of an architecture that aims to scale blockchains beyond the current state. Such properties are attainable by reducing ledger size and providing parallel operations in the blockchain. Sharding is one of the approaches that lower the burden of the nodes and enhance performance. However, the current sol… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 14 pages, 9 figures, 3 tables

  3. arXiv:2109.02012  [pdf, ps, other

    cs.CR cs.CY cs.DC

    Post-Quantum VRF and its Applications in Future-Proof Blockchain System

    Authors: Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou

    Abstract: A verifiable random function (VRF in short) is a powerful pseudo-random function that provides a non-interactively public verifiable proof for the correctness of its output. Recently, VRFs have found essential applications in blockchain design, such as random beacons and proof-of-stake consensus protocols. To our knowledge, the first generation of blockchain systems used inherently inefficient pro… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: 13 pages; 5 figures; 45 References; 3 tables; this paper is our original unpublished work

    MSC Class: 68Q85; (Primary) 94A60; 68M25(Secondary)

  4. arXiv:2104.13543  [pdf, other

    cs.CR

    Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting

    Authors: Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou

    Abstract: Blockchain rewriting with fine-grained access control allows a user to create a transaction associated with a set of attributes, while another user (or modifier) who possesses enough rewriting privileges from a trusted authority satisfying the attribute set can rewrite the transaction. However, it lacks accountability and is not designed for open blockchains that require no trust assumptions. In t… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

    Comments: Under submission

  5. arXiv:2011.06257  [pdf, other

    cs.NI cs.CR

    Securing Password Authentication for Web-based Applications

    Authors: Teik Guan Tan, Pawel Szalachowski, Jianying Zhou

    Abstract: The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deploy 2-factor authentication, rely on password authentication as one of the authentication factors. However phishing attacks continue to plague password-… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: 23 pages, 1 figure

  6. arXiv:2010.10170  [pdf, ps, other

    cs.CR

    Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective

    Authors: Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin

    Abstract: If two or more identical HTTPS clients, located at different geographic locations (regions), make an HTTPS request to the same domain (e.g. example.com), on the same day, will they receive the same HTTPS security guarantees in response? Our results give evidence that this is not always the case. We conduct scans for the top 250,000 most visited domains on the Internet, from clients located at five… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Journal ref: Computers & Security, vol. 97, no. 101975, 2020

  7. arXiv:2010.09112  [pdf, other

    cs.CR cs.CY cs.DC

    BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting

    Authors: Sarad Venugopalan, Ivan Homoliak, Zengpeng Li, Pawel Szalachowski

    Abstract: Voting is a means to agree on a collective decision based on available choices (e.g., candidates), where participants agree to abide by their outcome. To improve some features of e-voting, decentralized blockchain-based solutions can be employed, where the blockchain represents a public bulletin board that in contrast to a centralized bulletin board provides extremely high availability, censorship… ▽ More

    Submitted 10 May, 2023; v1 submitted 18 October, 2020; originally announced October 2020.

  8. arXiv:2007.15881  [pdf, other

    cs.CR

    Password-authenticated Decentralized Identities

    Authors: Pawel Szalachowski

    Abstract: Password-authenticated identities, where users establish username-password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over the Internet. Although they are simple, user-friendly, and broadly adopted, they offer insecure authentication and position server operators as trusted parties, giving them full control over users'… ▽ More

    Submitted 15 September, 2021; v1 submitted 31 July, 2020; originally announced July 2020.

  9. arXiv:2007.02287  [pdf, other

    cs.CR

    Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients

    Authors: Bithin Alangot, Daniel Reijsbergen, Sarad Venugopalan, Pawel Szalachowski

    Abstract: Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced to accept a maliciously forked view of the blockchain. In such an eclipse attack, the client is unable to reliably distinguish the canonical view of th… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

  10. arXiv:2006.01427  [pdf, other

    cs.CR

    LaKSA: A Probabilistic Proof-of-Stake Protocol

    Authors: Daniel Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou

    Abstract: We present Large-scale Known-committee Stake-based Agreement (LaKSA), a chain-based Proof-of-Stake protocol that is dedicated, but not limited, to cryptocurrencies. LaKSA minimizes interactions between nodes through lightweight committee voting, resulting in a simpler, more robust, and more scalable proposal than competing systems. It also mitigates other drawbacks of previous systems, such as hig… ▽ More

    Submitted 2 January, 2021; v1 submitted 2 June, 2020; originally announced June 2020.

  11. arXiv:2005.13339  [pdf, other

    cs.CR cs.DC

    Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing

    Authors: Ivan Homoliak, Pawel Szalachowski

    Abstract: Distributed ledger systems (i.e., blockchains) have received a lot of attention recently. They promise to enable mutually untrusted participants to execute transactions, while providing the immutability of the transaction history and censorship resistance. Although decentralized ledgers may become a disruptive innovation, as of today, they suffer from scalability, privacy, or governance issues. Th… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

  12. arXiv:2005.04377  [pdf, other

    cs.CR

    A First Look into DeFi Oracles

    Authors: Bowen Liu, Pawel Szalachowski, Jianying Zhou

    Abstract: Recently emerging Decentralized Finance (DeFi) takes the promise of cryptocurrencies a step further, leveraging their decentralized networks to transform traditional financial products into trustless and transparent protocols that run without intermediaries. However, these protocols often require critical external information, like currency or commodity exchange rates, and in this respect they rel… ▽ More

    Submitted 25 June, 2021; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: To appear IEEE DAPPS'21, an extended version

  13. arXiv:2003.13259  [pdf, other

    cs.CR

    SmartCert: Redesigning Digital Certificates with Smart Contracts

    Authors: Pawel Szalachowski

    Abstract: The Transport Layer Security (TLS) protocol and its public-key infrastructure (PKI) are widely used in the Internet to achieve secure communication. Validating domain ownership by trusted certification authorities (CAs) is a critical step in issuing digital certificates, but unfortunately, this process provides a poor security level. In this work, we present SmartCert, a novel approach based on sm… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  14. arXiv:2003.07495  [pdf, other

    cs.CR

    SMACS: Smart Contract Access Control Service

    Authors: Bowen Liu, Siwei Sun, Pawel Szalachowski

    Abstract: Although blockchain-based smart contracts promise a ``trustless'' way of enforcing agreements even with monetary consequences, they suffer from multiple security issues. Many of these issues could be mitigated via an effective access control system, however, its realization is challenging due to the properties of current blockchain platforms (like lack of privacy, costly on-chain resources, or lat… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: IEEE/IFIP DSN'20

  15. arXiv:2003.06127  [pdf, other

    cs.CR

    Fail-safe Watchtowers and Short-lived Assertions for Payment Channels

    Authors: Bowen Liu, Pawel Szalachowski, Siwei Sun

    Abstract: The recent development of payment channels and their extensions (e.g., state channels) provides a promising scalability solution for blockchains which allows untrusting parties to transact off-chain and resolve potential disputes via on-chain smart contracts. To protect participants who have no constant access to the blockchain, a watching service named as watchtower is proposed -- a third-party e… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: ACM AsiaCCS'20

  16. The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

    Authors: Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski

    Abstract: Blockchains are distributed systems, in which security is a critical factor for their success. However, despite their increasing popularity and adoption, there is a lack of standardized models that study blockchain-related security threats. To fill this gap, the main focus of our work is to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to… ▽ More

    Submitted 28 October, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

  17. arXiv:1907.00231  [pdf, ps, other

    cs.CR

    Towards Forward Secure Internet Traffic

    Authors: Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin

    Abstract: Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys. With a growing awareness of long-term mass surveillance programs by governments and others, FS has become widely regarded as a highly desirable property. This is particularly true in the TLS protoco… ▽ More

    Submitted 29 June, 2019; originally announced July 2019.

  18. arXiv:1906.06505  [pdf, other

    cs.CR

    Does "www." Mean Better Transport Layer Security?

    Authors: Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin

    Abstract: Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with "www" sub-domains, e.g. "example.com") as synonyms for their equivalent www-domains (those that are prefixed with "www" sub-domains, e.g. "www.example.com"). In this paper, we analyse datasets of nearly two million plain-domains against their equivalent www-domains to answer the foll… ▽ More

    Submitted 18 June, 2019; v1 submitted 15 June, 2019; originally announced June 2019.

    Comments: update metadata abstract from Latex text to normal

  19. arXiv:1905.09655  [pdf, other

    cs.CR cs.DC

    StrongChain: Transparent and Collaborative Proof-of-Work Consensus

    Authors: Pawel Szalachowski, Daniel Reijsbergen, Ivan Homoliak, Siwei Sun

    Abstract: Bitcoin is the most successful cryptocurrency so far. This is mainly due to its novel consensus algorithm, which is based on proof-of-work combined with a cryptographically-protected data structure and a rewarding scheme that incentivizes nodes to participate. However, despite its unprecedented success Bitcoin suffers from many inefficiencies. For instance, Bitcoin's consensus mechanism has been p… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

    Comments: USENIX Security '19

  20. arXiv:1904.06898  [pdf, other

    cs.CR

    A Security Reference Architecture for Blockchains

    Authors: Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski

    Abstract: Due to their interesting features, blockchains have become popular in recent years. They are full-stack systems where security is a critical factor for their success. The main focus of this work is to systematize knowledge about security and privacy issues of blockchains. To this end, we propose a security reference architecture based on models that demonstrate the stacked hierarchy of various thr… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  21. arXiv:1903.03954  [pdf, ps, other

    cs.CR

    Permissionless Blockchains and Secure Logging

    Authors: Chunpeng Ge, Siwei Sun, Pawel Szalachowski

    Abstract: The blockchain technology enables mutually untrusting participants to reach consensus on the state of a distributed and decentralized ledger (called a blockchain) in a permissionless setting. The consensus protocol of the blockchain imposes a unified view of the system state over the global network, and once a block is stable in the blockchain, its data is visible to all users and cannot be retros… ▽ More

    Submitted 10 March, 2019; originally announced March 2019.

    Comments: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)

  22. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets (Extended Version)

    Authors: Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter Hartel, Alexander Binder, Pawel Szalachowski

    Abstract: With the recent rise of cryptocurrencies' popularity, the security and management of crypto-tokens have become critical. We have witnessed many attacks on users and providers, which have resulted in significant financial losses. To remedy these issues, several wallet solutions have been proposed. However, these solutions often lack either essential security features, usability, or do not allow use… ▽ More

    Submitted 30 November, 2023; v1 submitted 9 December, 2018; originally announced December 2018.

    Comments: This is extended version of the paper published at ACM AFT'20

    Journal ref: AFT 2020: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, October 2020, Pages 145-162

  23. BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure

    Authors: Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig

    Abstract: This paper describes BlockPKI, a blockchain-based public-key infrastructure that enables an automated, resilient, and transparent issuance of digital certificates. Our goal is to address several shortcomings of the current TLS infrastructure and its proposed extensions. In particular, we aim at reducing the power of individual certification authorities and make their actions publicly visible and a… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Comments: Workshop on Blockchain and Sharing Economy Applications

  24. arXiv:1809.05674  [pdf, ps, other

    cs.CR

    DSTC: DNS-based Strict TLS Configurations

    Authors: Eman Salem Alashwali, Pawel Szalachowski

    Abstract: Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward-Secrecy), mainly to provide backward compatibility. This opens doors to downgrade attacks, as is the case of the POODLE attack [18], which explo… ▽ More

    Submitted 15 September, 2018; originally announced September 2018.

  25. arXiv:1808.06641  [pdf, other

    cs.CR

    PDFS: Practical Data Feed Service for Smart Contracts

    Authors: Juan Guarnizo, Pawel Szalachowski

    Abstract: Smart contracts are a new paradigm that emerged with the rise of the blockchain technology. They allow untrusting parties to arrange agreements. These agreements are encoded as a programming language code and deployed on a blockchain platform, where all participants execute them and maintain their state. Smart contracts are promising since they are automated and decentralized, thus limiting the in… ▽ More

    Submitted 26 June, 2019; v1 submitted 20 August, 2018; originally announced August 2018.

    Comments: Blockchain; Smart Contracts; Data Authentication; Ethereum

  26. arXiv:1806.04358  [pdf, other

    cs.CR

    Rethinking Blockchain Security: Position Paper

    Authors: Vincent Chia, Pieter Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniel Reijsbergen, Mark van Staalduinen, Pawel Szalachowski

    Abstract: Blockchain technology has become almost as famous for incidents involving security breaches as for its innovative potential. We shed light on the prevalence and nature of these incidents through a database structured using the STIX format. Apart from OPSEC-related incidents, we find that the nature of many incidents is specific to blockchain technology. Two categories stand out: smart contracts, a… ▽ More

    Submitted 24 April, 2019; v1 submitted 12 June, 2018; originally announced June 2018.

    Comments: 8 pages, 1 figure, accepted for presentation as a regular paper at IEEE Blockchain 2018 (Halifax, Canada)

  27. arXiv:1804.04274  [pdf, other

    cs.CR

    A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet

    Authors: Gaurav Varshney, Pawel Szalachowski

    Abstract: Domain Name System (DNS) domains became Internet-level identifiers for entities (like companies, organizations, or individuals) hosting services and sharing resources over the Internet. Domains can specify a set of security policies (such as, email and trust security policies) that should be followed by clients while accessing the resources or services represented by them. Unfortunately, in the cu… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: SecureComm'18

  28. arXiv:1804.00875  [pdf, other

    cs.CR

    Blockchain-based TLS Notary Service

    Authors: Pawel Szalachowski

    Abstract: The Transport Layer Security (TLS) protocol is a de facto standard of secure client-server communication on the Internet. Its security can be diminished by a variety of attacks that leverage on weaknesses in its design and implementations. An example of a major weakness is the public-key infrastructure (PKI) that TLS deploys, which is a weakest-link system and introduces hundreds of links (i.e., t… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

  29. arXiv:1803.09028  [pdf, other

    cs.CR

    (Short Paper) Towards More Reliable Bitcoin Timestamps

    Authors: Pawel Szalachowski

    Abstract: Bitcoin provides freshness properties by forming a blockchain where each block is associated with its timestamp and the previous block. Due to these properties, the Bitcoin protocol is being used as a decentralized, trusted, and secure timestam** service. Although Bitcoin participants which create new blocks cannot modify their order, they can manipulate timestamps almost undetected. This underm… ▽ More

    Submitted 18 May, 2018; v1 submitted 23 March, 2018; originally announced March 2018.

    Comments: In Proceedings of Crypto Valley Conference on Blockchain Technology (CVCBT), 2018

  30. arXiv:1702.05311  [pdf, other

    cs.CR

    Short Paper: On Deployment of DNS-based Security Enhancements

    Authors: Pawel Szalachowski, Adrian Perrig

    Abstract: Although the Domain Name System (DNS) was designed as a naming system, its features have made it appealing to repurpose it for the deployment of novel systems. One important class of such systems are security enhancements, and this work sheds light on their deployment. We show the characteristics of these solutions and measure reliability of DNS in these applications. We investigate the compatibil… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.

    Comments: Financial Cryptography and Data Security (FC) 2017

  31. arXiv:1610.00461  [pdf, ps, other

    cs.NI cs.CR

    Source Accountability with Domain-brokered Privacy

    Authors: Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig

    Abstract: In an ideal network, every packet would be attributable to its sender, while host identities and transmitted content would remain private. Designing such a network is challenging because source accountability and communication privacy are typically viewed as conflicting properties. In this paper, we propose an architecture that guarantees source accountability and privacy-preserving communication… ▽ More

    Submitted 3 October, 2016; originally announced October 2016.

  32. RITM: Revocation in the Middle

    Authors: Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig

    Abstract: Although TLS is used on a daily basis by many critical applications, the public-key infrastructure that it relies on still lacks an adequate revocation mechanism. An ideal revocation mechanism should be inexpensive, efficient, secure, and privacy-preserving. Moreover, rising trends in pervasive encryption pose new scalability challenges that a modern revocation system should address. In this paper… ▽ More

    Submitted 30 August, 2016; v1 submitted 28 April, 2016; originally announced April 2016.

    Comments: ICDCS 2016, Best Paper Award

  33. PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem

    Authors: Pawel Szalachowski, Laurent Chuat, Adrian Perrig

    Abstract: In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy. A few certification authorities (CAs) are currently responsible for the issuance of the large majority of TLS certificates. These certificates are considered valid only if the certificate… ▽ More

    Submitted 1 February, 2016; v1 submitted 15 January, 2016; originally announced January 2016.

    Comments: IEEE EuroS&P 2016

  34. Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs

    Authors: Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri

    Abstract: The level of trust accorded to certification authorities has been decreasing over the last few years as several cases of misbehavior and compromise have been observed. Log-based approaches, such as Certificate Transparency, ensure that fraudulent TLS certificates become publicly visible. However, a key element that log-based approaches still lack is a way for clients to verify that the log behaves… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

    Comments: 9 pages, 5 figures

  35. SIBRA: Scalable Internet Bandwidth Reservation Architecture

    Authors: Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa

    Abstract: This paper proposes a Scalable Internet Bandwidth Reservation Architecture (SIBRA) as a new approach against DDoS attacks, which, until now, continue to be a menace on today's Internet. SIBRA provides scalable inter-domain resource allocations and botnet-size independence, an important property to realize why previous defense approaches are insufficient. Botnet-size independence enables two end ho… ▽ More

    Submitted 7 January, 2016; v1 submitted 9 October, 2015; originally announced October 2015.

    Comments: To appear in Proceedings of Symposium on Network and Distributed System Security (NDSS) 2016

  36. arXiv:1508.02240  [pdf, ps, other

    cs.NI

    Bootstrap** Real-world Deployment of Future Internet Architectures

    Authors: Taeho Lee, Pawel Szalachowski, David Barrera, Adrian Perrig, Heejo Lee, David Watrin

    Abstract: The past decade has seen many proposals for future Internet architectures. Most of these proposals require substantial changes to the current networking infrastructure and end-user devices, resulting in a failure to move from theory to real-world deployment. This paper describes one possible strategy for bootstrap** the initial deployment of future Internet architectures by focusing on providing… ▽ More

    Submitted 10 August, 2015; originally announced August 2015.

  37. arXiv:1508.01651  [pdf, other

    cs.NI cs.CR

    SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks

    Authors: David Barrera, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig

    Abstract: The SCION (Scalability, Control, and Isolation on Next-generation Networks) inter-domain network architecture was proposed to address the availability, scalability, and security shortcomings of the current Internet. This paper presents a retrospective of the SCION goals and design decisions, its attacker model and limitations, and research highlights of work conducted in the 5 years following SCIO… ▽ More

    Submitted 7 August, 2015; originally announced August 2015.

  38. arXiv:1506.03392  [pdf, other

    cs.CR

    Designing a Global Authentication Infrastructure

    Authors: Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-** Kim, Adrian Perrig

    Abstract: We address the problem of scaling authentication for naming, routing, and end-entity certification to a global environment in which authentication policies and users' sets of trust roots vary widely. The current mechanisms for authenticating names (DNSSEC), routes (BGPSEC), and end-entity certificates (TLS) do not support a coexistence of authentication policies, affect the entire Internet when co… ▽ More

    Submitted 12 June, 2015; v1 submitted 10 June, 2015; originally announced June 2015.