Skip to main content

Certificate Recommendations to Improve the Robustness of Web of Trust

  • Conference paper
Information Security (ISC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3225))

Included in the following conference series:

Abstract

Users in a distributed system establish webs of trust by issuing and exchanging certificates amont themselves. This approach does not require a central, trusted keyserver. The distributed web of trust, however, is susceptible to attack by malicious users, who may issue false certificates. In this work, we propose a method for generating certificate recommendations. These recommendations guide the users in creating webs of trust that are highly robust to attacks. To accomplish this we propose a heuristic method of graph augmentation for the certificate graph, and show experimentally that it is close to optimal. We also investigate the impact of user preferences and non-compliance with these recommendations, and demonstrate that our method helps identify malicious users if there are any.

This work is partially supported by the U.S. Army Research Office under grant DAAD19-02-1-0219, and by the National Science Foundation under grant CCR-0207297.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahuja, R., Magnanti, T., Orlin, J.: Network flows: theory, algorithms, and applications. Prentice Hall, Englewood Cliffs (1993)

    Google Scholar 

  2. Aura, T.: On the structure of delegation networks. In: Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1998, pp. 14–26. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  3. Benczúr Pushdown-reduce, A.A.: an algorithm for connectivity augmentation and poset covering problems. Discrete Applied Mathematics 129(2-3), 233–262 (2003)

    Article  MathSciNet  Google Scholar 

  4. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 6-8, pp. 164–173. Oakland, CA,USA (1996)

    Google Scholar 

  6. Capkun, S., Buttyán, L., Hubaux, J.-P.: Small worlds in security systems: an analysis of the pgp certificate graph. In: Proceedings of the 2002 workshop on New security paradigms, pp. 28–35. ACM Press, New York (2002)

    Chapter  Google Scholar 

  7. Darnell, D.: Pgp or pki? the future of internet security. EDI Forum: The Journal of Electronic Commerce 12(1), 59–62 (1999)

    Google Scholar 

  8. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC 2693: SPKI certificate theory (September 1999)

    Google Scholar 

  9. Frank, A.: Connectivity augmentation problems in network design. Mathematical Programming: State of the Art 1994, 34–63 (1994)

    Google Scholar 

  10. Frank, A., Jordan, T.: Minimal edge-coverings of pairs of sets. Journal of Combinatorial Theory, Series B 65(1), 73–110 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  11. Frank, A., Jordan, T.: Directed vertex-connectivity augmentation. Mathematical Programming 84(3), 537–553 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  12. Harary, F.: Graph Theory. Addison-Wesley, Reading (1969)

    Google Scholar 

  13. Jiang, Q., Reeves, D.S., Ning, P.: Certificate recommendations to improve robustness of webs of trust. Technical Report TR-2004-04, Department of Computer Science, N.C. State University (January 2004)

    Google Scholar 

  14. Jiang, Q., Reeves, D.S., Ning, P.: Improving robustness of PGP by conflict detection. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 194–207. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Kleinberg, J.: The small-world phenomenon: an algorithm perspective. In: Proceedings of the thirty-second annual ACM symposium on Theory of computing, pp. 163–170. ACM Press, New York (2000)

    Chapter  Google Scholar 

  16. Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of the Seventh USENIX Security Symposium (1998)

    Google Scholar 

  17. Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 324–350. Springer, Heidelberg (1996)

    Google Scholar 

  18. Mendes, S., Huitema, C.: A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In: Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, USA, February 1995, pp. 172–189 (1995)

    Google Scholar 

  19. Grotschel, M., Lovasz, L., Schrijver, A.: The ellipsoid method and its consequences in combinatorial optimization. Combinatorica 1, 169–197 (1981)

    Article  MathSciNet  Google Scholar 

  20. Nagamochi, H., Ibaraki, T.: Graph connectivity and its augmentation: applications of ma orderings. Discrete Appl. Math. 123(1-3), 447–472 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  21. Reiter, M., Stubblebine, S.: Toward acceptable metrics of authentication. In: IEEE Symposium on Security and Privacy, pp. 10–20 (1997)

    Google Scholar 

  22. Reiter, M., Stubblebine, S.: Resilient authentication using path independence. IEEE Transactions on Computers 47(12) (December 1998)

    Google Scholar 

  23. Drew Streib, M.: Keyanalyze - analysis of a large OpenPGP ring., http://www.dtype.org/keyanalyze/

  24. Tarah, A., Huitema, C.: Associating metrics to certification paths. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 175–189. Springer, Heidelberg (1992)

    Chapter  Google Scholar 

  25. Int’l Telecommunications Union/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks (March 2000)

    Google Scholar 

  26. Watts, D., Strogatz, S.: Collective dynamics of small-world networks. Nature 393, 440 (1998)

    Article  Google Scholar 

  27. Zimmermann, P.: The official PGP user’s guide. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, Q., Reeves, D.S., Ning, P. (2004). Certificate Recommendations to Improve the Robustness of Web of Trust. In: Zhang, K., Zheng, Y. (eds) Information Security. ISC 2004. Lecture Notes in Computer Science, vol 3225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30144-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30144-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23208-7

  • Online ISBN: 978-3-540-30144-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics