{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:42:22Z","timestamp":1770540142382,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"HK RGC GRF PolyU","award":["15217321"],"award-info":[{"award-number":["15217321"]}]},{"name":"HK RGC GRF PolyU","award":["15216220"],"award-info":[{"award-number":["15216220"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tpds.2021.3121562","type":"journal-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T20:13:42Z","timestamp":1634760822000},"page":"1636-1649","source":"Crossref","is-referenced-by-count":10,"title":["Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4200-0941","authenticated-orcid":false,"given":"Zecheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Haotian","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8861-719X","authenticated-orcid":false,"given":"Lap Hou","family":"Lao","sequence":"additional","affiliation":[]},{"given":"Songtao","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7296-9222","authenticated-orcid":false,"given":"Yuanyuan","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4223-8220","authenticated-orcid":false,"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.168"},{"key":"ref32","article-title":"Trust assertions for certificate keys","author":"marlinspike","year":"2013"},{"key":"ref31","first-page":"801","article-title":"Fastkitten: Practical smart contracts on bitcoin","author":"das","year":"2019","journal-title":"Proc Usenix Secur Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406325"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.85"},{"key":"ref34","article-title":"Sovereign keys: A proposal to make HTTPS and email more secure","author":"eckersley","year":"2012"},{"key":"ref10","article-title":"Google security blog: Improved digital certificate security","author":"somogyi","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref13","first-page":"991","article-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proc Usenix Secur Symp"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243790"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354203"},{"key":"ref17","first-page":"142","article-title":"SgxPectre: Stealing intel secrets from SGX enclaves via speculative execution","author":"chen","year":"2019","journal-title":"Proc IEEE Symp Sec Priv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw039"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"ref28","article-title":"Smartcert: Redesigning digital certificates with smart contracts","author":"szalachowski","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7469"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.013"},{"key":"ref3","article-title":"Google warns of unauthorized TLS certificates trusted by almost all OSes","author":"goodin","year":"2013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488448"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23060"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"ref2","article-title":"Google hit again by unauthorized SSL\/TLS certificates","author":"kerner","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"ref1","article-title":"DigiNotar unauthorized certificates","year":"2011"},{"key":"ref20","article-title":"CertCoin: A namecoin based decentralized authentication system","author":"fromknecht","year":"2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.57"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055530"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486344"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889898"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/9603995\/09582795.pdf?arnumber=9582795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T17:55:55Z","timestamp":1649440555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9582795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":37,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2021.3121562","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}