Skip to main content

From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain

  • Conference paper
  • First Online:
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Included in the following conference series:

Abstract

PGP is built upon a Distributed Web of Trust in which a user’s trustworthiness is established by others who can vouch through a digital signature for that user’s identity. Preventing its wholesale adoption are a number of inherent weaknesses to include (but not limited to) the following: 1) Trust Relationships are built on a subjective honor system, 2) Only first degree relationships can be fully trusted, 3) Levels of trust are difficult to quantify with actual values, and 4) Issues with the Web of Trust itself (Certification and Endorsement). Although the security that PGP provides is proven to be reliable, it has largely failed to garner large scale adoption. In this paper, we propose several novel contributions to address the aforementioned issues with PGP and associated Web of Trust. To address the subjectivity of the Web of Trust, we provide a new certificate format based on Bitcoin which allows a user to verify a PGP certificate using Bitcoin identity-verification transactions - forming first degree trust relationships that are tied to actual values (i.e., number of Bitcoins transferred during transaction). Secondly, we present the design of a novel Distributed PGP key server that leverages the Bitcoin transaction blockchain to store and retrieve our certificates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Saarinen, J.: Yahoo to Provide PGP Encryption for Mail. ITnews for Australian Business. ITnews, August 08, 2014. Web August 26, 2014

    Google Scholar 

  2. Froomkin, A.M.: 1996 A.Michael Froomkin: The Essential Role Of Trusted Third Parties in Electronic Commerce. 1996 A.Michael Froomkin: The Essential Role of Trusted Third Parties in Electronic Commerce. N.p., October 14, 1994. Web February 18, 2014

    Google Scholar 

  3. Coindesk. What Is Bitcoin? CoinDesk RSS. Coindesk, March 20, 2015. Web August 13, 2015

    Google Scholar 

  4. Maras, E.: Bitcoin Users To Approach 5 Million Mark By 2019, Juniper Research Reports - CCN: Financial Bitcoin/Cryptocurrency News. CCN Financial Bitcoin Cryptocurrency News. CCN.LA, March 17, 2015. Web August 13, 2015

    Google Scholar 

  5. Torpey, K.: The Bitcoin Price Has Been Remarkably Stable Lately. The Bitcoin Price Has Been Remarkably Stable Lately. Inside Bitcoins, February 27, 2015. Web August 13, 2015

    Google Scholar 

  6. Apodaca, R.: OP-RETURN and the Future of Bitcoin. Bitzuma July 29, 2014. Web April 29, 2015

    Google Scholar 

  7. Cawrey, D.: BitPay Seeks to Decentralize Digital Identification with BitAuth. CoinDesk. CoinDesk, July 01, 2014. Web July 06, 2014

    Google Scholar 

  8. Bitpay. BitAuth, for Decentralized Authentication. Bitpay, July 01, 2014. Web July 06, 2014

    Google Scholar 

  9. Goldberg, I.: Off-the-Record Messaging. OTR Development Team (2012). Web February 25, 2014

    Google Scholar 

  10. Goldberg, I., Borisov, N., Brewer, E.: Off-the-Record Communication or, Why Not to use PGP. Zero-Knowlege Systems and U.C. Berkely, (2012). Print

    Google Scholar 

  11. Thoughtcrime Labs. Convergence Details. Convergence. Thoughtcrime Labs (2011). Web May 02, 2014

    Google Scholar 

  12. Wendlandt, D., Anderson, D.G., Perrig, A.: Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. Carnegie Mellon University (2011). Print

    Google Scholar 

  13. Bitcoin. Bitcoin Charts Various Bitcoin Charts and Currency Statistics. Bitcoin Charts. The Bitcoin Foundation (2009). Web. 02 May 2014

    Google Scholar 

  14. Bitcoin.org. Transacations. Bitcoin. Bitcoin.org (2014). Web May 06, 2014

    Google Scholar 

  15. CoinDesk. How Do Bitcoin Transactions Work? CoinDesk RSS March 06, 2014. Web July 02, 2014

    Google Scholar 

  16. Poor Decision-Making Can Lead to Cybersecurity Breaches Communications of the ACM. (n.d.) Web May 04, 2015. (Retrieved from http://cacm.acm.org/news/183571-poor-decision-making-can-lead-to-cybersecurity-breaches/fulltext)

  17. Bitcoin. Block Chain. Bitcoin Wiki. Bitcoin, April 21, 2014. Web July 15, 2014

    Google Scholar 

  18. O’Reilly. Transactions. Mastering Bitcoin. O’Reilly (2013). Web May 01, 2015

    Google Scholar 

  19. Krohn, M.: Keybase. Keybase. Caroline Hadilaksono, n.d. Web February 10, 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duane Wilson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wilson, D., Ateniese, G. (2015). From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics