{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:21:34Z","timestamp":1762608094620,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030629731"},{"type":"electronic","value":"9783030629748"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62974-8_18","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T13:10:38Z","timestamp":1606223438000},"page":"315-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["BlockVoke \u2013 Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5300-4641","authenticated-orcid":false,"given":"Abba","family":"Garba","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2124-7048","authenticated-orcid":false,"given":"Arne","family":"Bochem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9191-7548","authenticated-orcid":false,"given":"Benjamin","family":"Leiding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"18_CR1","unstructured":"Bitcoin Wiki - Multisignature (2019). https:\/\/en.bitcoin.it\/w\/index.php?title=Multisignature&oldid=67043. Accessed 1 Sept 2020"},{"key":"18_CR2","unstructured":"Baldi, M., Chiaraluce, F., Frontoni, E., Gottardi, G., Sciarroni, D., Spalazzi, L.: Certificate validation through public ledgers and blockchains. In: Proceedings of the First Italian Conference on Cybersecurity, ITASEC 2017, pp. 156\u2013165 (2017)"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TDSC.2016.2601610","volume":"15","author":"DA Basin","year":"2018","unstructured":"Basin, D.A., Cremers, C., Kim, T.H., Perrig, A., Sasse, R., Szalachowski, P.: Design, analysis, and implementation of ARPKI: an attack-resilient public-key infrastructure. IEEE Trans. Depend. Secure Comput. 15(3), 393\u2013408 (2018)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Berkowsky, J.A., Hayajneh, T.: Security issues with certificate authorities. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 449\u2013455. IEEE (2017)","DOI":"10.1109\/UEMCON.2017.8249081"},{"key":"18_CR5","unstructured":"Blockchain Explorer - Blockchain.com: Bitcoin - Average Block Size (MB) (2020). https:\/\/www.blockchain.com\/charts\/avg-block-size. Accessed 1 Apr 2020"},{"key":"18_CR6","unstructured":"Blockchain Explorer - Blockchain.com: Bitcoin - Average Transactions per Block (2020). https:\/\/www.blockchain.com\/charts\/n-transactions-per-block. Accessed 1 Apr 2020"},{"key":"18_CR7","unstructured":"Blockchain Explorer - Blockchain.com: Bitcoin - Fees per Transaction (USD) (2020). https:\/\/www.blockchain.com\/charts\/fees-usd-per-transaction. Accessed 1 Apr 2020"},{"key":"18_CR8","unstructured":"Blockchain Explorer - Blockchain.com: Bitcoin - Median Confirmation Time (2020). https:\/\/www.blockchain.com\/charts\/median-confirmation-time. Accessed 1 Apr 2020"},{"key":"18_CR9","unstructured":"Bugzilla: Bugzilla #1311713 - Comodo: CA Comodo used broken OCR and issued certificates to the wrong people (2016). https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1311713. Accessed 19 Mar 2020"},{"key":"18_CR10","unstructured":"Bugzilla: Bugzilla #1619179 - Let\u2019s Encrypt: Incomplete revocation for CAA rechecking bug (2020). https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1619179#c7. Accessed 18 Mar 2020"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Callas, J. and PGP Corporation and Donnerhacke, L. and IKS GmbH and Finney, H. and PGP Corporation and Shaw, D. and Thayer, R.: OpenPGP Message Format. IETF RFC4880, November 2007. Accessed 24 Mar 2020","DOI":"10.17487\/rfc4880"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Chen, J., Yao, S., Yuan, Q., He, K., Ji, S., Du, R.: CertChain: public and efficient certificate audit based on blockchain for TLS connections. In: IEEE INFOCOM - IEEE Conference on Computer Communications, pp. 2060\u20132068. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8486344"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Chung, T., et al.: Is the web ready for OCSP must-staple? In: Proceedings of the Internet Measurement Conference 2018, pp. 105\u2013118 (2018)","DOI":"10.1145\/3278532.3278543"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC5280, May 2008. Accessed 18 Mar 2020","DOI":"10.17487\/rfc5280"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Transport Layer Security (TLS) Extensions: Extension Definitions. IETF RFC6066, January 2011. Accessed 18 March 2020","DOI":"10.17487\/rfc6066"},{"key":"18_CR16","unstructured":"Etherscan.io: Ether Daily Price (USD) Chart (2020). https:\/\/etherscan.io\/chart\/etherprice. Accessed 31 Mar 2020"},{"key":"18_CR17","unstructured":"Etherscan.io: Ethereum Average Gas Price Chart (2020). https:\/\/etherscan.io\/chart\/gasprice. Accessed 31 Mar 2020"},{"key":"18_CR18","unstructured":"Fromknecht, C., Velicanu, D., Yakoubov, S.: A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptology ePrint Archive, p. 803 (2014)"},{"key":"18_CR19","unstructured":"Hallam-Baker, P.: X.509v3 Extension: OCSP Stapling Required - Draft-hallambaker-muststaple-00 (2012). https:\/\/tools.ietf.org\/html\/draft-hallambaker-muststaple-00. Accessed 18 Mar 2020"},{"key":"18_CR20","unstructured":"Hansen, R.J.: SKS Keyserver Network Under Attack (2019). https:\/\/gist.github.com\/rjhansen\/67ab921ffb4084c865b3618d6955275f. Accessed 25 Mar 2020"},{"key":"18_CR21","volume-title":"Digital Anthropology","author":"HA Horst","year":"2013","unstructured":"Horst, H.A., Miller, D.: Digital Anthropology. A&C Black, London (2013)"},{"key":"18_CR22","first-page":"102356","volume":"48","author":"Q Hu","year":"2019","unstructured":"Hu, Q., Asghar, M.R., Brownlee, N.: Checking certificate revocation efficiently using certificate revocation guard. J. Inf. Secur. Appl. 48, 102356 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR23","unstructured":"ImperialViolet: Revocation Checking and Chrome\u2019s CRL (2012). https:\/\/www.imperialviolet.org\/2012\/02\/05\/crlsets.html. Accessed 26 Mar 2020"},{"key":"18_CR24","unstructured":"Hoffman-Andrews, J.: Let\u2019s Encrypt - 2020.02.29 CAA Rechecking Bug (2020). https:\/\/community.letsencrypt.org\/t\/2020-02-29-caa-rechecking-bug\/114591. Accessed 18 Mar 2020"},{"key":"18_CR25","unstructured":"JamesLE: Let\u2019s Encrypt - Revoking Certain Certificates on March 4 (2020). https:\/\/community.letsencrypt.org\/t\/revoking-certain-certificates-on-march-4\/114864. Accessed 18 Mar 2020"},{"key":"18_CR26","unstructured":"J.C. Jones: CRLite: Speeding Up Secure Browsing (2020). https:\/\/blog.mozilla.org\/security\/2020\/01\/21\/crlite-part-3-speeding-up-secure-browsing\/. Accessed 19 Mar 2020"},{"issue":"3","key":"18_CR27","first-page":"77","volume":"2","author":"R Khare","year":"1997","unstructured":"Khare, R., Rifkin, A.: Weaving a web of trust. World Wide Web J. 2(3), 77\u2013112 (1997)","journal-title":"World Wide Web J."},{"key":"18_CR28","unstructured":"Klafter, R., Swanson, E.: Evil 32: Check Your GPG Fingerprints (2014). https:\/\/evil32.com\/. Accessed 25 Mar 2020"},{"key":"18_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"FC 1998","author":"PC Kocher","year":"1998","unstructured":"Kocher, P.C.: On certificate revocation and validation. In: Hirchfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 172\u2013177. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055481"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.cose.2019.05.013","volume":"85","author":"MY Kubilay","year":"2019","unstructured":"Kubilay, M.Y., Kiraz, M.S., Mantar, H.A.: CertLedger: a new PKI model with certificate transparency based on blockchain. Comput. Secur. 85, 333\u2013352 (2019)","journal-title":"Comput. Secur."},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Larisch, J., Choffnes, D., Levin, D., Maggs, B.M., Mislove, A., Wilson, C.: CRLite: a scalable system for pushing all TLS revocations to all browsers. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 539\u2013556. IEEE (2017)","DOI":"10.1109\/SP.2017.17"},{"key":"18_CR32","unstructured":"Leiding, B.: Link topological analysis of the PGP web of trust. Bachelor\u2019s Thesis, University of Rostock, Rostock, Germany (2015)"},{"key":"18_CR33","unstructured":"Leiding, B., Cap, C.H., Mundt, T., Rashidibajgan, S.: Authcoin: validation and authentication in decentralized networks. In: The 10th Mediterranean Conference on Information Systems - MCIS 2016, Paphos, Cyprus, September 2016"},{"key":"18_CR34","unstructured":"Let\u2019s Encrypt: Let\u2019s Encrypt - Statistics (2020). https:\/\/letsencrypt.org\/de\/stats\/. Accessed 06 Apr 2020"},{"key":"18_CR35","unstructured":"Song, L.: Signing an Ethereum Transaction the Hard Way (2018). https:\/\/lsongnotes.wordpress.com\/2018\/01\/14\/signing-an-ethereum-transaction-the-hard-way\/. Accessed 06 Apr 2020"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: An end-to-end measurement of certificate revocation in the web\u2019s PKI. In: Proceedings of the 2015 Internet Measurement Conference, pp. 183\u2013196. ACM (2015)","DOI":"10.1145\/2815675.2815685"},{"key":"18_CR37","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 15 Mar 2020"},{"issue":"4","key":"18_CR38","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/49.839932","volume":"18","author":"M Naor","year":"2000","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. IEEE J. Sel. Areas Commun. 18(4), 561\u2013570 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"18_CR39","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman, R.: An overview of PKI trust models. IEEE Network 13(6), 38\u201343 (1999)","journal-title":"IEEE Network"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Pettersen, Y.: The Transport Layer Security (TLS) Multiple Certificate Status Request Extension. IETF RFC6961, June 2013. Accessed 22 March 2020","DOI":"10.17487\/rfc6961"},{"key":"18_CR41","unstructured":"Prince, M.: The Hidden Costs of Heartbleed (2014). https:\/\/blog.cloudflare.com\/the-hard-costs-of-heartbleed\/. Accessed 1 Sept 2020"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Santesson, S., Myers, M., Malpani, A., Galperin, S., Adams, C.: X. 509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. IETF RFC6960, June 2013. Accessed 18 Mar 2020","DOI":"10.17487\/rfc6960"},{"key":"18_CR44","doi-asserted-by":"publisher","unstructured":"Singh, H.J., Hafid, A.S.: Prediction of transaction confirmation time in Ethereum blockchain using machine learning. In: Prieto, J., Das, A., Ferretti, S., Pinto, A., Corchado, J. (eds.) BLOCKCHAIN 2019. AISC, vol. 1010, pp. 126\u2013133. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-23813-1_16","DOI":"10.1007\/978-3-030-23813-1_16"},{"key":"18_CR45","doi-asserted-by":"crossref","unstructured":"Smith, T., Dickinson, L., Seamons, K.: Let\u2019s revoke: scalable global certificate revocation. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society (2020)","DOI":"10.14722\/ndss.2020.24084"},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Su, K., Li, J., Fu, H.: Smart city and the applications. In: International Conference on Electronics, Communications and Control (ICECC), pp. 1028\u20131031. IEEE (2011)","DOI":"10.1109\/ICECC.2011.6066743"},{"key":"18_CR47","unstructured":"Wood, G.: Ethereum Yellow Paper: A Secure Decentralized Generalised Transaction Ledger - BYZANTIUM VERSION 7e819ec - 2019\u201310-20 (2019). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. Accessed 06 Apr 2020"},{"key":"18_CR48","doi-asserted-by":"crossref","unstructured":"Yakubov, A., Shbair, W., Wallbom, A., Sanda, D., et al.: A blockchain-based PKI management framework. In: The First IEEE\/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) Colocated with IEEE\/IFIP NOMS 2018, Tapei, Tawain 23\u201327 April 2018 (2018)","DOI":"10.1109\/NOMS.2018.8406325"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62974-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:10:25Z","timestamp":1607299825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62974-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030629731","9783030629748"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62974-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2020.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}