{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:34:37Z","timestamp":1760150077279,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior\u2014Brasil (CAPES)","doi-asserted-by":"publisher","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Operador Nacional do Registro Civil de Pessoas Naturais (ON-RCPN) do Brasil","award":["001"],"award-info":[{"award-number":["001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Private key management is a complex obstacle arising from the traditional public key infrastructure model. However, before any related security breach can be addressed, it must first be reliably detected. Certificate Transparency (CT) is an example of a certificate issuance monitoring strategy, developed to detect the possible malfeasance of certification authorities (CAs). To the best of our knowledge, CT and other detection mechanisms do not cover digitally signed documents made by an end user, which are also susceptible to CA misbehavior. We modify the CT framework to handle signed documents via logging certificates in the blockchain to enable the secure and user-friendly monitoring of one-time signatures, backdating protection, and effective CA misbehavior detection. Moreover, to demonstrate the feasibility of our proposal, we present distinct deployment scenarios and analyze the storage, performance, and monetary costs.<\/jats:p>","DOI":"10.3390\/info14100523","type":"journal-article","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T03:49:14Z","timestamp":1695786554000},"page":"523","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Monitoring Key Pair Usage through Distributed Ledgers and One-Time Signatures"],"prefix":"10.3390","volume":"14","author":[{"given":"Lucas","family":"Mayr","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica e Estat\u00edstica, Universidade Federal de Santa Catarina, Florian\u00f3polis 88040-900, Brazil"}]},{"given":"Lucas","family":"Palma","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica e Estat\u00edstica, Universidade Federal de Santa Catarina, Florian\u00f3polis 88040-900, Brazil"}]},{"given":"Gustavo","family":"Zambonin","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica e Estat\u00edstica, Universidade Federal de Santa Catarina, Florian\u00f3polis 88040-900, Brazil"}]},{"given":"Wellington","family":"Silvano","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica e Estat\u00edstica, Universidade Federal de Santa Catarina, Florian\u00f3polis 88040-900, Brazil"}]},{"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica e Estat\u00edstica, Universidade Federal de Santa Catarina, Florian\u00f3polis 88040-900, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"ref_1","unstructured":"Kohnfelder, L.M. (1978). Towards a Practical Public-key Cryptosystem. [Bachelor\u2019s Thesis, Massachusetts Institute of Technology]."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.5038\/1944-0472.6.2.4","article-title":"DigiNotar: Dissecting the First Dutch Digital Disaster","volume":"6","year":"2013","journal-title":"J. Strateg. Secur."},{"key":"ref_3","unstructured":"Laurie, B., Langley, A., Kasper, E., Messeri, E., and Stradling, R. (2023, August 20). Certificate Transparency Version 2.0. RFC 9162, Internet Engineering Task Force. Available online: https:\/\/www.rfc-editor.org\/info\/rfc9162."},{"key":"ref_4","unstructured":"Kampanakis, P., Panburana, P., Daw, E., and Geest, D.V. (2023, August 20). The Viability of Post-quantum X.509 Certificates; Cryptology ePrint Archive, Paper 2018\/063; ISARA; 2018. Available online: https:\/\/www.isara.com\/resource-center\/the-viability-of-post-quantum-x.509-certificates.html."},{"key":"ref_5","first-page":"173","article-title":"W-OTS+\u2014Shorter Signatures for Hash-Based Signature Schemes","volume":"Volume 7918","year":"2013","journal-title":"Progress in Cryptology\u2014 AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, 22\u201324 June 2013"},{"key":"ref_6","first-page":"363","article-title":"On the Security of the Winternitz One-Time Signature Scheme","volume":"Volume 6737","author":"Buchmann","year":"2011","journal-title":"Progress in Cryptology\u2014AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, 5\u20137 July 2011"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Madala, D.S.V., Jhanwar, M.P., and Chattopadhyay, A. (2018, January 17\u201320). Certificate Transparency Using Blockchain. Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore.","DOI":"10.1109\/ICDMW.2018.00018"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Garba, A., Hu, Q., Chen, Z., and Al, M.R.A. (2020, January 14\u201316). BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management. Proceedings of the 2020 IEEE 6th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), Yanuca Island, Cuvu, Fiji.","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00108"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1093\/comjnl\/bxaa081","article-title":"KORGAN: An Efficient PKI Architecture Based on PBFT through Dynamic Threshold Signatures","volume":"64","author":"Kubilay","year":"2021","journal-title":"Comput. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1109\/TPDS.2021.3121562","article-title":"Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE","volume":"33","author":"Li","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"13097","DOI":"10.1007\/s00521-019-04403-6","article-title":"A PKI without TTP based on conditional trust in blockchain","volume":"32","author":"Han","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Vives, S.J. (2017, January 1\u20133). Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain. Proceedings of the Actas del IX Congreso Iberoamericano de Seguridad Inform\u00e1tica, Buenos Aires, Argentina.","DOI":"10.31219\/osf.io\/dru9t"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106523","DOI":"10.1016\/j.compeleceng.2019.106523","article-title":"Long-term verification of signatures based on a blockchain","volume":"81","author":"Hyla","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_14","first-page":"226","article-title":"KCRS: A Blockchain-Based Key Compromise Resilient Signature System","volume":"Volume 1156","author":"Xu","year":"2019","journal-title":"BlockSys 2019: Blockchain and Trustworthy Systems, Guangzhou, China, 7\u20138 December 2019"},{"key":"ref_15","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press. [1st ed.]."},{"key":"ref_16","unstructured":"Goldreich, O. (2004). Foundations of Cryptography: Volume 2, Basic Applications, Cambridge University Press. [1st ed.]."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"103644","DOI":"10.1016\/j.csi.2022.103644","article-title":"Advanced Electronic Signatures and eIDAS\u2014Analysis of the Concept","volume":"83","year":"2023","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_18","unstructured":"(2021). Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation. Standard No. ETSI EN 319 102-1 V1.3.1."},{"key":"ref_19","first-page":"96","article-title":"Hash Based Digital Signature Schemes","volume":"Volume 3796","author":"Dods","year":"2005","journal-title":"Cryptography and Coding 2005: Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, 19\u201321 December 2005"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-031-22972-5_1","article-title":"Recovering the Tight Security Proof of SPHINCS+","volume":"Volume 13794","author":"Kudinov","year":"2022","journal-title":"ASIACRYPT 2022: Advances in Cryptology\u2014ASIACRYPT 2022"},{"key":"ref_21","unstructured":"Nakamoto, S. (2023, August 20). Bitcoin: A Peer-to-Peer Electronic Cash System; 2008. Available online: https:\/\/ssrn.com\/abstract=3440802."},{"key":"ref_22","unstructured":"Wood, G. (2022). Ethereum: A Secure Decentralised Generalised Transaction Ledger, Ethereum Foundation."},{"key":"ref_23","unstructured":"Hyperledger Foundation (2018). An Introduction to Hyperledger, Hyperledger Foundation."},{"key":"ref_24","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S.L., Rijneveld, J., and Mohaisen, A. (2023, August 20). XMSS: eXtended Merkle Signature Scheme. RFC 8391, Internet Engineering Task Force. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc8391.html."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Palma, L.M., Vigil, M.A.G., Pereira, F.L., and Martina, J.E. (2019). Blockchain and smart contracts for higher education registry in Brazil. Int. J. Netw. Manag., 29.","DOI":"10.1002\/nem.2061"},{"key":"#cr-split#-ref_26.1","unstructured":"European Parliament and the Council of the European Union (2016). Regulation"},{"key":"#cr-split#-ref_26.2","unstructured":"(EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016. Off. J. Eur. Union, L119, 1-88."},{"key":"ref_27","unstructured":"Brasil (2018). Lei n\u00ba 13.079, de 14 de agosto de 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais (LGPD). Di\u00e1rio Oficial da Uni\u00e3o, 157, 59\u201364."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","article-title":"Privacy-Preserving Solutions for Blockchain: Review and Challenges","volume":"7","author":"Bernabe","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","unstructured":"Benet, J. (2014). IPFS\u2014Content Addressed, Versioned, P2P File System. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Fiege, U., Fiat, A., and Shamir, A. (1987, January 1). Zero knowledge proofs of identity. Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, NY, USA.","DOI":"10.1145\/28395.28419"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1007\/s12599-020-00656-x","article-title":"The Energy Consumption of Blockchain Technology: Beyond Myth","volume":"62","author":"Sedlmeir","year":"2020","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_32","unstructured":"Ongaro, D., and Ousterhout, J. (2014, January 19\u201320). In search of an understandable consensus algorithm. Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC 14), Philadelphia, PA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., and Saxena, P. (2016, January 24\u201328). A secure sharding protocol for open blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria.","DOI":"10.1145\/2976749.2978389"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., Miller, C., and Moody, D. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process, Internal Report 8413-upd1.","DOI":"10.6028\/NIST.IR.8413"},{"key":"ref_35","unstructured":"Instituto Nacional de Tecnologia da Informa\u00e7\u00e3o (2022). Relat\u00f3rio de Gest\u00e3o 2022, Instituto Nacional de Tecnologia da Informa\u00e7\u00e3o."},{"key":"ref_36","unstructured":"Kuik, S. (2022). In 20 Years, More than 800 Million Digital Signatures Have Been Given in Estonia|RIA, Information System Authority."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Kostamis, P., Sendros, A., and Efraimidis, P. (2021, January 27\u201330). Exploring Ethereum\u2019s Data Stores: A Cost and Performance Comparison. Proceedings of the 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS52497.2021.9569804"},{"key":"ref_38","unstructured":"Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013). Computer Aided Verification: 25th International Conference, CAV 2013, Saint Petersburg, Russia, 13\u201319 July 2013, Springer."},{"key":"ref_39","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., and Mantovani, J. (2005). Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, 6\u201310 July 2005, Springer."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/10\/523\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:58:58Z","timestamp":1760129938000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/10\/523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":40,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["info14100523"],"URL":"https:\/\/doi.org\/10.3390\/info14100523","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2023,9,26]]}}}