ticate an invalidation of that public key, before re-
registering identity with a new online public key.
• Case 4: Both Secret Keys, Stolen. The owner
may reconstruct his offline secret keys using so-
cial backup, and use this to prove ownership of
the current online public key. The case is then re-
duced to Case 2 – access. If social backup has not
been enabled, then the owner may prove owner-
ship of the master key pair (mpkf, mskf) used in
the initial key registration stage (see Table 1), and
use this to invalidate the current online public key.
• Case 5: All Keys, Including Past Offline Se-
cret Keys, and Master Keys, Stolen. There is no
mechanism for dealing with this case, in which the
owner cannot prove identity using either past of-
fline, or master, keys. Past offline keys and master
keys should be stored separately for this reason.
Where identity must be traced (e.g., for liability
cases in vehicular networks) authoritiescan ask a pub-
lic key to disclose his offline secret keys and nonces,
present and historic. The original identity posting can
thus be traced back, and identity reliably retrieved.
This procedure is secure against identity spoofing,
since without knowledge of all their offline secret
keys, an entity cannot pose as any network member
other than himself. If the public key owner does not
cooperate, a network majority can use the key shares
from each update to reconstruct the keys of the target.
4.3 Neighbour Group Anonymity
Entities in the PKI may form neighbour groups of
“trusted” members. This trust may be based on so-
cial knowledge, in online forums, or on physical prox-
imity, in vehicular networks, for example. Since
entities are not anonymous within their neighbour
groups, other group members can attest the correct-
ness of their actions (key updates, revocations) to the
rest of the network, improving the security of certain
PKI functionalities. The members of these neighbour
groups can also perform simultaneous key updates,
preventing linking of key updates by timestamp.
Vehicular ad-hoc networks are an example of an
application in which neighbour group anonymity is
appropriate. In this case, it is unnecessary to seek
unlinkability of actions towards the group of entities
that are physically nearby, the prevention of tracking
through keys by whom is futile. Vehicles in phys-
ical proximity can therefore form temporary neigh-
bour groups, attesting to the rest of the network that
the correct entity is performing key updates. Systems
for the management of these trusted groups across dif-
ferent use-cases are outside the scope of this paper.
5 DISCUSSION
An adversary might have some attack capabilities
against PB-PKI aside from those gained from stealing
or accessing a party’s secret keys. Network members
havegreater adversarial capabilities than non-network
members. Since the verification process at key up-
dates involves only checking that the party involved
is a network member, an adversarial network member
may update the public key of a targeted party to a new
public key under his control. Similarly, an adversar-
ial network member may revoke the online public key
of another member, preventing communication until
ownership is proved and the key retrieved.
In the total anonymity case, it is possible for net-
work members to cause disruption by updating or re-
voking other members’ keys in this way. Our mecha-
nism allows retrieval of prior keys and therefore iden-
tity, but does not prevent other members from chang-
ing the keys for the period of time until retrieval.
Since network members are anonymous, such attacks
cannot be targeted at identities but at public keys.
Neighbour groups prevent adversarial network mem-
bers from attacking in this way, since members of a
targeted party’s neighbour group can attest to the net-
work that the change was not initiated by the correct
identity, and the change would not be processed.
To achieve the total anonymity privacy level us-
ing PB-PKI, there is a trade-off with security. As
described, an entity E can be temporarily disrupted,
leaving a time gap in which an adversarial network
member may pose as E. In the total anonymity case,
this is intuitively the best we can do. To prove own-
ership of the current public key, or prove the identity
at the time of update, would mean revealing either the
current and updated keys together, or identity – en-
abling either linking of public keys, or knowledge of
the identity to which the new public key belongs. This
security weakness can be addressed using neighbour
groups who can attest the correctness of an entity’s
actions in cases where this privacy level is sufficient.
The security of the Namecoin blockchain itself
relies on the majority of miners being honest par-
ties. A collusive majority of dishonest network mem-
bers could undermine the security of PB-PKI, since
its security relies on the underlying blockchain be-
ing unsubverted. PB-PKI enables identification of ad-
versarial network members by the two methods be-
low, which correspond to the total anonymity case.
For neighbour group anonymity, these methods apply,
and the members of the misbehaving user’s neighbour
group can also aid identification.
• Majority Consensus. The offline secret key shar-
ing process at each update (see Table 2) means