oped the proof of concept using the Go programming
language and show that the solutions we proposed are
feasible.
In the future, we plan to implement optimiza-
tions to the ring signature scheme. New ring sig-
nature schemes such as forward-secure linkable ring
signatures (Boyen and Haines, 2018) will also be in-
vestigated as this supports forward security and the
blockchain user can prove ownership of a ring signa-
ture using this scheme.
ACKNOWLEDGMENTS
We acknowledge David Derler, Sebastian Ramacher,
Peter Lipp and Clemens Brunner for fruitful discus-
sions during the period of this work. We acknowledge
Sebastian Ramacher, Peter Lipp and Clemens Brun-
ner for their thorough reviews.
This research is part of the LIGHTest project
funded by the European Union’s Horizon 2020 re-
search and innovation programme under G.A. No
700321.
REFERENCES
Axon, L. and Goldsmith, M. (2017). Pb-pki: A privacy-
aware blockchain-based pki. In Proceedings of the
14th International Joint Conference on e-Business
and Telecommunications - Volume 6: SECRYPT,
(ICETE 2017), pages 311–318. INSTICC, SciTePress.
Boneh, D. (1998). Twenty years of attacks on the rsa cryp-
tosystem.
Boyen, X. and Haines, T. (2018). Forward-secure linkable
ring signatures from bilinear maps. Cryptography,
2(4):35.
Conner Fromknecht, Dragos Velicanu, S. Y. (2014). Cert-
coin: A namecoin based decentralized authentication
system.
Derler, D., Hanser, C., and Slamanig, D. (2015). Revisiting
cryptographic accumulators, additional properties and
relations to other primitives. In Topics in Cryptology -
CT-RSA 2015, The Cryptographer’s Track at the RSA
Conference 2015, San Francisco, CA, USA, April 20-
24, 2015. Proceedings, pages 127–144.
Garay, J. A., Kiayias, A., Leonardos, N., and Panagiotakos,
G. (2018). Bootstrapping the blockchain, with appli-
cations to consensus and fast PKI setup. In Public-
Key Cryptography - PKC 2018 - 21st IACR Interna-
tional Conference on Practice and Theory of Public-
Key Cryptography, Rio de Janeiro, Brazil, March 25-
29, 2018, Proceedings, Part II, pages 465–495.
Karaarslan, E. and Adiguzel, E. (2018). Blockchain based
DNS and PKI solutions. IEEE Communications Stan-
dards Magazine, 2(3):52–57.
Matsumoto, S. and Reischuk, R. M. (2016). IKP: turn-
ing a PKI around with blockchains. IACR Cryptology
ePrint Archive, 2016:1018.
Maymounkov, P. and Mazi
`
eres, D. (2002). Kademlia: A
peer-to-peer information system based on the xor met-
ric. In Revised Papers from the First International
Workshop on Peer-to-Peer Systems, IPTPS ’01, pages
53–65, London, UK, UK. Springer-Verlag.
Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic
cash system.
Reyzin, L. and Yakoubov, S. (2015). Efficient asynchronous
accumulators for distributed pki. IACR Cryptology
ePrint Archive, 2015:718.
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How
to leak a secret. In Advances in Cryptology - ASI-
ACRYPT 2001, 7th International Conference on the
Theory and Application of Cryptology and Informa-
tion Security, Gold Coast, Australia, December 9-13,
2001, Proceedings, pages 552–565.
Singla, A. and Bertino, E. (2018). Blockchain-based PKI
solutions for iot. In 4th IEEE International Confer-
ence on Collaboration and Internet Computing, CIC
2018, Philadelphia, PA, USA, October 18-20, 2018,
pages 9–15.
Yakubov, A., Shbair, W. M., Wallbom, A., Sanda, D., and
State, R. (2018). A blockchain-based PKI manage-
ment framework. In 2018 IEEE/IFIP Network Op-
erations and Management Symposium, NOMS 2018,
Taipei, Taiwan, April 23-27, 2018, pages 1–6.
Zimmermann, P. (1994). Pgp user’s guide, volume i: Es-
sential topics.
Revisiting Privacy-aware Blockchain Public Key Infrastructure
423