atomic verification mechanism integrated with the
Bitcoin system at the protocol level inherits the trust
from the system. The limitation that a certificate can
only be verified once is mitigated by having multiple
outpoints representing the same certificate.
The commonalities between a certificate
management system and the Bitcoin system allow us
to delegate a significant amount of work to the
Bitcoin system and achieve great savings for the
certificate management system. The extra gain is the
security that is induced by the proof of work, which
prevents the history from being malleated even when
CA’s private key is compromised.
ACKNOWLEDGEMENTS
The authors would like to thank K. Molloy, M. S.
Kiraz and O. Vaughan for their invaluable
contributions to the paper. In addition, the authors
gratefully acknowledge the reviewers of the
SECRYPT conference for their insightful feedback.
C. Tartan would like to thank T. Tartan and E. Parry
for the fruitful discussions. W. Zhang would like to
thank J. Zhang and A. Zhu for their sweet support.
REFERENCES
Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless
Public Key Cryptography. International Conference on
the Theory and Application of Cryptology and
Information Security (pp. 452-473). Springer.
Axon, L., & Goldsmith, M. (2017). PB-PKI: A Privacy-
Aware Blockchain-Based PKI. Proceedings of the 14th
International Joint Conference on e-Business and
Telecommunications (pp. 311-318). SECRYPT.
Bitcoin SV. (2021). Bitcoin SV node software. Retrieved
from Github: https://github.com/bitcoin-sv/bitcoin-sv
Blagov, N., & Helm, M. (2020). State of the Certificate
Transparency Ecosystem. Network Architectures and
Services, 43-48.
Blockchair. (2020). Bitcoin SV block with over 1.3 millions
transactions. Retrieved from Blockchair:
https://blockchair.com/bitcoin-sv/block/635141
Blockchair. (2021). Bitcoin SV Average Transaction Fee.
Retrieved from Blockchair: https://blockchair.com/
bitcoin-sv/charts/average-transaction-fee-usd
Boneh, D., & Franklin, M. (2001). Identity-Based
Encryption from the Weil Pairing. Annual International
Cryptology Conference (pp. 213-229). Springer.
Boneh, D., Lynn, B., & Shacham, H. (2001). Short
Signatures from the Weil Pairing. International
Conference on the Theory and Application of
Cryptology and Information Security (pp. 514-532).
Springer.
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., &
Thayer, R. (2007, November). RFC 4880: OpenPGP
Message Format. Retrieved from Request for
Comments. IETF.: https://tools.ietf.org/html/rfc4880
CERT Division. (2001). 2001 CERT Advisories. Software
Engineering Institute, Carnegie Mellon University.
Retrieved from https://resources.sei.cmu.edu/
asset_files/WhitePaper/2001_019_001_496192.pdf
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley,
R., & Polk, W. T. (2008, May). RFC 5280: Internet
X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile. Retrieved
from Request for Comments. IETF.:
https://tools.ietf.org/html/rfc5280
Council of EU. (2018). Factsheet - 5th Anti Money
Laundering Directive . Retrieved from Official Website
of European Union: https://ec.europa.eu/info/files/
factsheet-main-changes-5th-anti-money-laundering-
directive_en
DigiCert. (2021). SCT Delivery. Retrieved from Certificate
Transparency: https://www.digicert.com/faq/
certificate-transparency/enabling-ct.htm
Eastlake, D. 3. (2011, January). RFC 6066: Transport
Layer Security (TLS) Extensions: Extension
Definitions. Retrieved from Request for Comments.
IETF.: https://tools.ietf.org/html/rfc6066
Etherscan. (2020). Ethereum Average Gas Price Chart.
Retrieved from Etherscan: https://etherscan.io/
chart/gasprice
Fromknecht, C., Velicanu, D., & Yakoubov, S. (2014,
May). CertCoin: A NameCoin Based Decentralized
Authentication System. Retrieved from Technical
Report MIT: https://courses.csail.mit.edu/6.857/
2014/files/19-fromknecht-velicann-yakoubov-
certcoin.pdf
Galbraith, S., Paterson, K., & Smart, N. (2008). Pairings for
Cryptographers. Discrete Appl. Math. 156 (16), 3113-
3121.
Gennaro, R., & Goldfeder, S. (2018). Fast Multiparty
Threshold ECDSA with Fast Trustless Setup.
Conference on Computer and Communications
Security (pp. 1179-1194). ACM SIGSAC.
Google. (2013). Retrieved from Certificate Transparency:
https://sites.google.com/site/certificatetransparency/
Google. (2021). Working together to detect maliciously or
mistakenly issued certificates. Retrieved from
Certificate Transparency: https://certificate.
transparency.dev/
Hallam-Baker, P. (2015, October). RFC 7633: X.509v3
Transport Layer Security (TLS) Feature Extension.
Retrieved from Request for Comments. IETF.:
https://tools.ietf.org/html/rfc7633
Hoogstraaten, H. (2012). Black Tulip Report of the
investigation into the DigiNotar Certificate . Technical
Report. Fox-IT BV.
IdenTrust Services. (2021, March). IdenTrust Global
Common Certificate Policy. Page 91. Retrieved from
https://www.identrust.com/sites/default/files/resources
/IGC-CP-v1.5.3_03012021.pdf
Kubilay, M. Y., Kiraz, M. S., & Mantar, H. A. (2019).