ACKNOWLEDGEMENTS
The financial support by the Federal State of Salzburg
is gratefully acknowledged. Funding by the Austrian
Research Promotion Agency (FFG) under project
number 865082 (ProChain) is gratefully acknowl-
edged.
REFERENCES
Ahmed, A. S. and Aura, T. (2018). Turning Trust Around:
Smart Contract-Assisted Public Key Infrastructure. In
17th IEEE International Conference on Trust, Secu-
rity and Privacy in Computing and Communications,
pages 104–111, New York, NY, USA. IEEE.
Al-Bassam, M. (2017). SCPKI: A Smart Contract-based
PKI and Identity System. In Proceedings of the ACM
Workshop on Blockchain, Cryptocurrencies and Con-
tracts, pages 35–40, Abu Dhabi, UAE. ACM.
Alexopoulos, N., Daubert, J., Muhlhauser, M., and Habib,
S. M. (2017). Beyond the Hype: On Using
Blockchains in Trust Management for Authentica-
tion. In 2017 IEEE Trustcom/BigDataSE/ICESS,
pages 546–553, Sydney, Australia. IEEE.
Ali, M., Nelson, J., Shea, R., and Freedman, M. J. (2016).
Blockstack: A Global Naming and Storage System
Secured by Blockchains. In USENIX Annual Tech-
nical Conference, pages 181–194, Denver. USENIX
Association.
Axon, L. (2015). Privacy-awareness in
blockchain-based PKI. Technical report.
http://ora.ox.ac.uk/objects/uuid:f8377b69-599b-
4cae-8df0-f0cded53e63b.
Axon, L. and Goldsmith, M. (2017). PB-PKI : a
Privacy-Aware Blockchain-Based PKI Conventional
Approaches to PKI. In Proceedings of the 14th
International Joint Conference on e-Business and
Telecommunications (ICETE 2017), pages 311 —-
318, Madrid, Spain.
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M., and
Division, C. S. (2012). NIST 800-57: Computer Se-
curity.
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers,
I., Tromer, E., and Virza, M. (2014). Zerocash: De-
centralized Anonymous Payments from Bitcoin. In
Proceedings – IEEE Symposium on Security and Pri-
vacy, pages 459–474, San Jose, CA, USA. IEEE.
Brunner, C., Knirsch, F., and Engel, D. (2019). SPROOF:
A platform for issuing and verifying documents in a
public blockchain. In Proceedings of the 5th Inter-
national Conference on Information Systems Security
and Privacy, pages 15–25, Prague, Czech Republic.
SciTePress.
Caronni, G. (2000). Walking the Web of Trust. In 9th
International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises (WET
ICE 2000), pages 153–158, Gaithersburg, MD, USA.
IEEE.
Chen, J., Yao, S., Yuan, Q., He, K., Ji, S., and Du, R.
(2018). CertChain: Public and Efficient Certificate
Audit Based on Blockchain for TLS Connections. In
IEEE International Conference on Computer Com-
munications, pages 2060–2068, Honolulu, HI, USA.
IEEE.
Delmolino, K., Arnett, M., Kosba, A. E., Miller, A., and
Shi, E. (2016). Step by Step Towards Creating a
Safe Smart Contract: Lessons and Insights from a
Cryptocurrency Lab. In Financial Cryptography and
Data Security, pages 79–94, Christ Church, Barbados.
Springer, Berlin, Heidelberg.
Dierks, T. and Rescorla, E. (2008). The Transport Layer
Security (TLS) Protocol Version 1.2. RFC 5246.
https://tools.ietf.org/html/rfc5246.
European Parliament and Council of the European Union
(2016). Regulation (EU) 2016/679 of the Euro-
pean Parliament and of the Council of 27 April
2016 on the protection of natural persons with re-
gard to the processing of personal data and on the
free movement of such data, and repealing Directive
95/46/EC (General Da. http://eur-lex.europa.eu/legal-
content/EN/TXT/?uri=CELEX:32016R0679.
Eyal, I. and Sirer, E. G. (2014). Majority is not Enough:
Bitcoin Mining is Vulnerable. In Financial Cryp-
tography and Data Security, pages 436–454, Christ
Church. ACM.
Fromknecht, C., Velicanu, D., and Yakoubov, S.
(2014). CertCoin: A NameCoin Based De-
centralized Authentication System. Tech-
nical report, MIT, Cambridge, MA, USA.
https://courses.csail.mit.edu/6.857/2014/files/19-
fromknecht-velicann-yakoubov-certcoin.pdf.
Galperin, S., Santesson, S., Myers, M., Malpani, A., and
Adams, C. (2000). X.509 Internet Public Key Infras-
tructure Online Certificate Status Protocol - OCSP.
RFC2560. https://tools.ietf.org/html/rfc2560.
Garfinkel, S. (1994). PGP: Pretty Good Privacy. O’Reilly
Media, Sebastopol, CA, USA.
Gutmann, P. (2002). PKI: It’s not dead, just resting. Com-
puter, 35(8):41–49.
Hammi, M. T., Bellot, P., and Serhrouchni, A. (2018). BC-
Trust : A decentralized authentication blockchain-
based mechanism. In IEEE Wireless Communications
and Networking Conference, pages 1–6, Barcelona,
Spain. IEEE.
Housley, R., Polk, W., Ford, W., and Solo, D. (2008). In-
ternet X. 509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile. RFC 5280.
https://tools.ietf.org/html/rfc5280.
Karaarslan, E. and Adiguzel, E. (2018). Blockchain Based
DNS and PKI Solutions. IEEE Communications Stan-
dards Magazine, 2(3):52–57.
Karlsson, K., Jiang, W., Wicker, S., Adams, D., Ma, E.,
Van Renesse, R., and Weatherspoon, H. (2018). Veg-
visir: A partition-tolerant blockchain for the internet-
of-things. In International Conference on Distributed
Computing Systems, pages 1150–1158. IEEE.
Khieu, B. and Moh, M. (2019). CBPKI : Cloud Blockchain-
based Public Key Infrastructure. In ACM SE ’19:
Proceedings of the 2019 ACM Southeast Conference,
pages 58–63, Kennesaw, GA, USA. ACM.
A Comparison of Blockchain-based PKI Implementations
339