{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:07Z","timestamp":1750220587062,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SECREDAS","award":["783119"],"award-info":[{"award-number":["783119"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["871473"],"award-info":[{"award-number":["871473"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411495.3421362","type":"proceedings-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T23:35:56Z","timestamp":1604619356000},"page":"119-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Short-Lived Forward-Secure Delegation for TLS"],"prefix":"10.1145","author":[{"given":"Lukas","family":"Alber","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Stefan","family":"More","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Sebastian","family":"Ramacher","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134007"},{"key":"e_1_3_2_1_3_1","unstructured":"D. F. Aranha and C. P. L. Gouv\u00eaa. 2020. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic  D. F. Aranha and C. P. L. Gouv\u00eaa. 2020. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"e_1_3_2_1_5_1","unstructured":"R. Barnes S. Iyengar N. Sullivan and E. Rescorla. 2020. Delegated Credentials for TLS. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-subcerts-07  R. Barnes S. Iyengar N. Sullivan and E. Rescorla. 2020. Delegated Credentials for TLS. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-subcerts-07"},{"key":"e_1_3_2_1_6_1","volume-title":"SCN (Lecture Notes in Computer Science","volume":"267","author":"Barreto Paulo S. L. M.","year":"2002"},{"volume-title":"Barreto and Michael Naehrig","year":"2005","author":"Paulo S. L.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00021"},{"volume-title":"EuroS&P","author":"Bhargavan Karthikeyan","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9082-x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"volume-title":"Franklin","year":"2001","author":"Boneh Dan","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366316.2366333"},{"volume-title":"Rajeev Anand Sahu, and Vishal Saraswat","year":"2016","author":"Buccafurri Francesco","key":"e_1_3_2_1_16_1"},{"volume-title":"USENIX Security Symposium. USENIX Association, 991--1008","year":"2018","author":"Bulck Jo Van","key":"e_1_3_2_1_17_1"},{"volume-title":"IEEE Symposium on Security and Privacy. IEEE, 54--72","year":"2020","author":"Bulck Jo Van","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_16"},{"volume-title":"Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. In ACM Conference on Computer and Communications Security. ACM, 628--640","year":"2016","author":"Cangialosi Frank","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Eunsang Cho Minkyung Park Hyunwoo Lee Junhyeok Choi and Ted Taekyoung Kwon. 2019. D2TLS: delegation-based DTLS for cloud-based IoT services. In IoTDI. ACM 190--201.  Eunsang Cho Minkyung Park Hyunwoo Lee Junhyeok Choi and Ted Taekyoung Kwon. 2019. D2TLS: delegation-based DTLS for cloud-based IoT services. In IoTDI. ACM 190--201."},{"volume-title":"SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. arxiv","year":"1906","author":"Chuat Laurent","key":"e_1_3_2_1_22_1"},{"volume-title":"Proxy Certificates: The Missing Link in the Web's Chain of Trust. CoRR","year":"2019","author":"Chuat Laurent","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278543"},{"volume-title":"Data","year":"2022","author":"Systems Cisco","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","volume":"5280","author":"Cooper David","year":"2008","journal-title":"RFC"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_16"},{"volume-title":"Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks.","year":"2018","author":"Derler David","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","first-page":"912","article-title":"I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting","volume":"2019","author":"Derler David","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935230_12"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_34"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"volume-title":"Delegated credentials: Improving the security of TLS certificates. https:\/\/engineering.fb.com\/security\/delegated-credentials\/ retrieved","year":"2020","author":"Guzman Alex","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","volume-title":"Selected Areas in Cryptography (Lecture Notes in Computer Science","volume":"324","author":"Hess Florian","year":"2002"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol","volume":"6698","author":"Hoffman Paul E.","year":"2012","journal-title":"TLSA. RFC"},{"key":"e_1_3_2_1_36_1","unstructured":"IAIK. 2020 a. ECCelerate. https:\/\/jce.iaik.tugraz.at\/products\/core-crypto-toolkits\/eccelerate\/  IAIK. 2020 a. ECCelerate. https:\/\/jce.iaik.tugraz.at\/products\/core-crypto-toolkits\/eccelerate\/"},{"key":"e_1_3_2_1_37_1","unstructured":"IAIK. 2020 b. iSaSiLK. https:\/\/jce.iaik.tugraz.at\/products\/communication-messaging-security\/isasilk\/  IAIK. 2020 b. iSaSiLK. https:\/\/jce.iaik.tugraz.at\/products\/communication-messaging-security\/isasilk\/"},{"volume-title":"Validating Delegated Credentials for TLS in Firefox. https:\/\/blog.mozilla.org\/security\/2019\/11\/01\/validating-delegated-credentials-for-tls-in-firefox\/ retrived","year":"2020","author":"Jacobs Kevin","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_17"},{"volume-title":"Identity-Based Cryptography","series-title":"Cryptology and Information Security Series","author":"Kiltz Eike","key":"e_1_3_2_1_40_1"},{"volume-title":"David Mazi\u00e8 res, and Keith Winstein","year":"2017","author":"Kogan Dmitry","key":"e_1_3_2_1_41_1"},{"volume-title":"CRYPTO (1) (Lecture Notes in Computer Science","author":"Krawczyk Hugo","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668152.2668154"},{"volume-title":"An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model","author":"Wang Li.","key":"e_1_3_2_1_44_1"},{"volume-title":"When HTTPS Meets CDN: A Case of Authentication in Delegated Service. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 67--82","year":"2014","author":"Liang Jinjin","key":"e_1_3_2_1_45_1"},{"volume-title":"Proxy Signatures for Delegating Signing Operation. In ACM Conference on Computer and Communications Security. ACM, 48--57","year":"1996","author":"Mambo Masahiro","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","volume-title":"Mycrypt (Lecture Notes in Computer Science","volume":"108","author":"Menezes Alfred","year":"2016"},{"key":"e_1_3_2_1_48_1","first-page":"1","article-title":"TOTP","volume":"6238","author":"David","year":"2011","journal-title":"Time-Based One-Time Password Algorithm. RFC"},{"volume-title":"Konstantina Papagiannaki, Pablo Rodr'i guez Rodr'i guez, and Peter Steenkiste.","year":"2015","author":"Naylor David","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","unstructured":"Yoav Nir Thomas Fossati Yaron Sheffer and Toerless Eckert. 2018. Considerations For Using Short Term Certificates. http:\/\/www.ietf.org\/internet-drafts\/draft-nir-saag-star-01.txt  Yoav Nir Thomas Fossati Yaron Sheffer and Toerless Eckert. 2018. Considerations For Using Short Term Certificates. http:\/\/www.ietf.org\/internet-drafts\/draft-nir-saag-star-01.txt"},{"key":"e_1_3_2_1_51_1","first-page":"1","article-title":"The Transport Layer Security (TLS) Protocol Version 1.3","volume":"8446","author":"Rescorla Eric","year":"2018","journal-title":"RFC"},{"key":"e_1_3_2_1_52_1","first-page":"1","article-title":"Datagram Transport Layer Security Version 1.2","volume":"6347","author":"Rescorla Eric","year":"2012","journal-title":"RFC"},{"key":"e_1_3_2_1_53_1","unstructured":"Y. Sakemi T. Kobayashi and T. Saito. 2020. Pairing-Friendly Curves. https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-pairing-friendly-curves-03  Y. Sakemi T. Kobayashi and T. Saito. 2020. Pairing-Friendly Curves. https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-pairing-friendly-curves-03"},{"key":"e_1_3_2_1_54_1","first-page":"1","article-title":"Internet X.509 Public Key Infrastructure Subject Alternative Name for Expression of Service Name","volume":"4985","author":"Santesson Stefan","year":"2007","journal-title":"RFC"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_56_1","volume-title":"CRYPTO (Lecture Notes in Computer Science","volume":"53","author":"Shamir Adi","year":"1984"},{"volume-title":"The Case for Prefetching and Prevalidating TLS Server Certificates","author":"Stark Emily","key":"e_1_3_2_1_57_1"},{"volume-title":"TrustCom\/BigDataSE\/ISPA (1)","author":"Stebila Douglas","key":"e_1_3_2_1_58_1"},{"volume-title":"Keyless SSL: The Nitty Gritty Technical Details. https:\/\/blog.cloudflare.com\/keyless-ssl-the-nitty-gritty-technical-details\/ retrieved","year":"2020","author":"Sullivan Nick","key":"e_1_3_2_1_59_1"},{"volume-title":"Delegated Credentials for TLS. https:\/\/blog.cloudflare.com\/keyless-delegation\/ retrieved","year":"2020","author":"Sullivan Nick","key":"e_1_3_2_1_60_1"},{"volume-title":"EuroS&P","author":"Szalachowski Pawel","key":"e_1_3_2_1_61_1"},{"volume-title":"Towards short-lived certificates. Web 2.0 Security and Privacy","year":"2012","author":"Topalovic Emin","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_17"},{"volume-title":"IP Latency Statistics. https:\/\/enterprise.verizon.com\/terms\/latency\/ retrieved","year":"2020","key":"e_1_3_2_1_64_1"},{"volume-title":"Open Identity Summit (LNI","author":"Wagner Georg","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_1_67_1","unstructured":"Changzheng Wei Jian Li Weigang Li Ping Yu and Haibing Guan. 2017. STYX: a trusted and accelerated hierarchical SSL key management and distribution system for cloud based CDN application. In SoCC. ACM 201--213.  Changzheng Wei Jian Li Weigang Li Ping Yu and Haibing Guan. 2017. STYX: a trusted and accelerated hierarchical SSL key management and distribution system for cloud based CDN application. In SoCC. ACM 201--213."},{"volume-title":"Heidemann","year":"2016","author":"Zhu Liang","key":"e_1_3_2_1_68_1"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411495.3421362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411495.3421362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411495.3421362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":68,"alternative-id":["10.1145\/3411495.3421362","10.1145\/3411495"],"URL":"https:\/\/doi.org\/10.1145\/3411495.3421362","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}