Figure 6: Variation of the size of issued certificates with the
number of endorsers for different key sizes.
When the requests were made through the Proxy
REST API with HTTP, a Round Trip Time of 32ms
was noted with the dedicated server. In this scenario,
the local-host client was used to call the DPKI func-
tions in a local computer. In both the evaluations (i.e.,
latency comparison of certificate issuing and certifi-
cate revocation process), functions write data to the
ledger of the blockchain. The currently stored CRL is
obtained and returned so that the endorsers can sign it
and insert their signatures in the response.
6 CONCLUSIONS AND FUTURE
WORKS
The objective of this work is to provide an effective,
robust and reliable user identity management PKI
using a decentralized approach. This study merges
the concepts of blockchain and decentralized storage
structure with the ability of PKI to generate a certifi-
cate. Each of the peers on the network uses a unique
intermediate certificate authority and validator. Any
peer who joins the network will become an intermedi-
ate signing CA. The guarantee that the produced cer-
tificates are legitimate and unaltered is constantly val-
idated by other peers in the network.
We can optimize the current implementation of
our model to enhance its functioning. Specifically,
we would emphasize on using a blockchain frame-
work that uses DID and DPKI internally. In our
current model, the certificates used in transactions
are still generated by a utility function of the Hyper-
ledger Fabric. Another possible improvement is to
use the same generated key-pairs and certificates for
both DPKI signatures and transaction signatures.
REFERENCES
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C.,
Christidis, K., De Caro, A., Enyeart, D., Ferris,
C., Laventman, G., Manevich, Y., Muralidharan, S.,
Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith,
K., Sorniotti, A., Stathakopoulou, C., Vukolic, M.,
Cocco, S. W., and Yellick, J. (2018). Hyperledger fab-
ric: A distributed operating system for permissioned
blockchains. In Proceedings of the Thirteenth EuroSys
Conference, EuroSys ’18, New York, NY, USA. Asso-
ciation for Computing Machinery.
Burr, W. E., Nazario, N. A., and Polk, W. T. (1996). A
proposed federal pki using x. 509 v3 certificates. NIST
Gaithersburg.
Chiu, W.-Y., Meng, W., and Jensen, C. D. (2021). Chainpki-
towards ethash-based decentralized pki with privacy
enhancement. In 2021 IEEE Conference on Depend-
able and Secure Computing (DSC), pages 1–8. IEEE.
Chu, Y., Kim, J. M., Lee, Y., Shim, S., and Huh, J. (2020).
Ss-dpki: Self-signed certificate based decentralized
public key infrastructure for secure communication.
In 2020 IEEE International Conference on Consumer
Electronics (ICCE), pages 1–6.
Dacosta, I., Ahamad, M., and Traynor, P. (2012). Trust no
one else: Detecting mitm attacks against ssl/tls with-
out third-parties. In European symposium on research
in computer security, pages 199–216. Springer.
Garba, A., Chen, Z., Guan, Z., and Srivastava, G. (2021).
Lightledger: A novel blockchain-based domain cer-
tificate authentication and validation scheme. IEEE
Transactions on Network Science and Engineering.
Isirova, K. and Potii, O. (2018). Decentralized public key
infrastructure development principles. In 2018 IEEE
9th International Conference on Dependable Systems,
Services and Technologies (DESSERT), pages 305–
310.
Kuzlu, M., Pipattanasomporn, M., Gurses, L., and Rahman,
S. (2019). Performance analysis of a hyperledger fab-
ric blockchain framework: Throughput, latency and
scalability. In 2019 IEEE International Conference
on Blockchain (Blockchain), pages 536–540.
Salman, T., Zolanvari, M., Erbad, A., Jain, R., and Samaka,
M. (2019). Security services using blockchains: A
state of the art survey. IEEE Communications Surveys
Tutorials, 21(1):858–880.
Sousa, J., Bessani, A., and Vukolic, M. (2018). A byzan-
tine fault-tolerant ordering service for the hyperledger
fabric blockchain platform. In 2018 48th Annual
IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), pages 51–58.
Vukolic, M. (2017). Rethinking permissioned blockchains.
In Proceedings of the ACM Workshop on Blockchain,
Cryptocurrencies and Contracts, BCC ’17, page 3–7,
New York, NY, USA. Association for Computing Ma-
chinery.
Yaga, D., Mell, P., Roby, N., and Scarfone, K. (2018).
Blockchain technology overview.
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric
559