Show simple item record

dc.contributor.advisorSrini Devadas.en_US
dc.contributor.authorFromknecht, Conner(Conner M.)en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2017-12-20T18:17:09Z
dc.date.available2017-12-20T18:17:09Z
dc.date.copyright2017en_US
dc.date.issued2017en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/112914en_US
dc.descriptionThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 69-70).en_US
dc.description.abstractMost of the secure communication protocols that power the Internet of today rely on a robust and frictionless mechanism for digital identity attestation. Authentication is typically achieved using a Public Key Infrastructure (PKI) that enables users to verify a counterparty's public key binding. Unfortunately, the structure of many existing PKIs present vulnerabilities and usability issues that stem from a lack of consistency, inefficient updates, or a dependence on centralized entities. In this work we present a decentralized marketplace for digital identities that autonomously leases the verification state of a globally-consistent PKI. Users express ownership of an identity through a sequence of leases, which incrementally defines the conditions under which ownership can be renewed and the identity's bindings can be updated. A careful structuring of the lease semantics, economic incentives and architectural design enables a fast update protocol, which permits clients to verify and accept a fresher binding without needing to wait for confirmation from the underlying consensus layer. The task of registration accuracy is extended naturally through the structure of the DNS namespace, after which the state of the system at any particular time acts as the root of trust during authentication. We discuss a novel seizure-resistance mechamism called dormancy, which in turn gives the existing owner of an identity substantial preference during the renewal process. Finally, we show how the system could be used to efficiently and unobtrusively secure today's communication protocols.en_US
dc.description.statementofresponsibilityby Conner Fromknecht.en_US
dc.format.extent70 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleLOKI : a lease-oriented key infrastructure with instant updates and seizure-resistanceen_US
dc.title.alternativeLease-oriented key infrastructure with instant updates and seizure-resistanceen_US
dc.typeThesisen_US
dc.description.degreeM. Eng.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.oclc1015247248en_US
dc.description.collectionM.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienceen_US
dspace.imported2019-06-17T20:29:56Zen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record