Public Key Infrastructure (PKI) has long secured online communication through certificate authorities, but its centralized model faces scalability, flexibility, and trust challenges. This article explores the evolution of PKI and introduces decentralized alternatives—including SDSI, TOFU, IRMA, and Sovrin—that aim to redefine authentication, digital identity, and trust on the internet.Public Key Infrastructure (PKI) has long secured online communication through certificate authorities, but its centralized model faces scalability, flexibility, and trust challenges. This article explores the evolution of PKI and introduces decentralized alternatives—including SDSI, TOFU, IRMA, and Sovrin—that aim to redefine authentication, digital identity, and trust on the internet.

A Timeline of Public Key Infrastructure: What Worked, What Failed, and What’s Next

Abstract and I Introduction

II. PKI Problems and Risks

III. Evolution of PKI

IV. National Digital Identity Implementations

V. Conclusion and References

III. EVOLUTION OF PKI

In this chapter, there are presented different views of how the Public Key Infrastructure can evolve and a brief history of alternative systems tried. PKI provides authentication, encryption, and digital signatures, ensuring secure communication, data integrity, and trust in online transactions. From its introduction to the public, alongside the explosion of the World Wide Web, it was only considered from a centralized point of view that had the trust in the Certificate Authorities. The majority of the solutions presented are developing towards a decentralized view of the system, starting as early as 1996 with SDSI, that try to solve some problems from Chapter II. After less than 10 years from its public use, PKI shortcomings were addressed in KeyNote [13], a trust-management system that uses a decentralized approach to handling public key infrastructure, allowing entities to manage their own keys and certificates addressing the scalability and flexibility issues associated with centralized PKIs. The full timeline of events can be observed in Figure 1.

\ A. SDSI

\ SDSI, or A Simple Distributed Security Infrastructure, is an innovative framework designed to address the complexities of security in distributed computing environments [56] tackling the first PKI problem presented while offering a robust and flexible solution, a first step in direction of SPKI(Simple public key infrastructure).

\ One of the most important features of SDSI is its simplicity. It achieves this through clear and intuitive mechanisms that focus on fundamental aspects of security by defining and representing security principles, establishing naming and addressing conventions, and expressing security policies.

\ By providing a straightforward means to define who or what can access resources, SDSI simplifies the task of managing access control. This clarity extends to naming and addressing, enabling a seamless way to locate and identify entities within a distributed network. SDSI recognizes that trust is a foundational element in security, and its framework allows for the establishment of trust among various entities within the system. At the same time, SDSI is the first step towards a decentralized public key infrastructure, allowing entities to make local decisions about access control based on their local policies and knowledge, rather than relying on a central authority for all decisions.

\ While SDSI offers a good step towards a less problematic infrastructure in distributed environments, it’s important to acknowledge that it may not be suitable for all use cases with an accent on digital identity. As state also by the creators of SDSI, ”We feel […] identity certificates must typically in the end be examined by people, to see if the name and other attributes given are consistent with the attributes known to the human reader” [56], the problem of trust is transferred to the issuer(country in our case).

\ Over the years after SDSI design, multiple attempts have been made to use it in more practical ways to be able to overcome the problem of economic reasons. For example, in 1997, one year after SDSI release, a C library was created [28] to pave the way for its usage in different scenarios alongside a Java implementation in 1998 [47] followed by an implementation of a secure web client using SPKI/SDSI certificates [46] in 2000, to meet the growing importance of the World Wide Web and with a case study on the effect on a company.

\ B. Perspectives(TOFU)

\ Trust-on-first-use(TOFU) is a strategy where, during the first encounter with a server or system, the user accepts and stores its public key without explicit verification. Subsequent connections are allowed only if the presented key matches the stored key, being a pragmatic approach to bootstrapping trust in a key-based authentication system. From its introduction to Secure Shell protocol, TOFU was seen as an improvement to the PKI ecosystem from 2008 with Perspectives [64], with no certificate authority needed to verify the identity of server owners and grant them certificates. The validity of a service’s key is determined by its existence on the network over time. Perspectives system helps mitigate man-in-the-middle attacks by providing users with a more reliable basis for trust in the presented server public key.

\ However, the infrastructure inherits problems from the TOFU protocol, assuming that the initial connection is secure and that the user can trust the initial public key received during the first connection. If an attacker can compromise this initial connection, they may be able to present a malicious key that Perspectives would then consider as legitimate. The Perspectives system relies on a network of notary servers distributed across the Internet, presenting a new decentralized solution of PKI. Implementing and maintaining a network of notary servers can be complex and the effectiveness of Perspectives relies on widespread adoption and a sufficient number of notaries to provide diverse perspectives. Achieving and sustaining this level of adoption can be challenging and can increase the already complex infrastructure.

\ C. IRMA

\ IRMA stands for ”I Reveal My Attributes” and is a project aimed at implementing attribute-based identity management that seeks to address issues related to attributes, their possibilities, and challenges [6].

\ The paper acknowledges the existence of cryptographic techniques for secure and privacy-friendly attribute-based authentication, noting that recent advancements in smart card technology have made it possible to deploy attributes in practical scenarios. The concept of attributes [7] is used broadly

\ Fig. 1: Timeline of evolution and problem statements for PKI

\ to describe the properties of individuals. These attributes may range from anonymous attributes (non-identifying), such as gender or age, to identifying attributes, like bank account or social security numbers. The paper highlights that while the underlying technology ensures full unlinkability, attribute values may allow for linkability expanding the range of application scenarios. It relies on the Idemix technology and uses personal smart cards as carriers of credentials and attributes.

\ The extensive use of attributes within IRMA leads to dependencies between attributes, where the issuance of one attribute may depend on the verification of another. These dependencies give rise to a tree structure for attributes and raise questions about what should be considered ”root” attributes that do not depend on others. These considerations have implications for societal identity structures, including pseudonym accounts.

\ The paper suggests the involvement of an independent, nonprofit foundation to manage the IRMA scheme, set policy, and oversee certificate management for access to the card. This foundation would play a crucial role in addressing sensitive issues related to attribute management and policy solving perhaps the economic and legal problem of monopoly of a company on a scheme.

\ More work has been added to the IRMA project, with an implementation for smartphones [8] in 2017 to facilitate its usage by ordinary people (with an app and QR codes) but also for service providers using standardized JSON Web Tokens. In 2019, solutions were proposed to contribute to ensuring the confidentiality and integrity of IRMA credentials in various scenarios. ”Backup and Recovery of IRMA Credentials” [23] emphasizes that a recovery solution for IRMA should be designed as a backup and restore mechanism. To enhance portability and user-friendliness, the backup should be encrypted in a way that allows storage in any location without imposing a specific storage location on the user.

\ In this, key management is a crucial aspect of the design. The primary solution involves using a mnemonic phrase that can be written down on paper, an approach that does not require technical expertise and is understandable to users. Additionally, parts of the key are managed by trustees or a trusted institution as a second authentication factor to enhance security.

\ D. Soverin

\ Security requirements for digital identity systems mirror those of traditional paper credentials, encompassing compatibility, unforgeability, scalability, low latency, and revocation capabilities. Digital identity systems offer advantages like minimal dependencies, privacy/anonymity, unlinkability, and selective disclosure, providing a level of control impossible in paper-based systems.

\ Privacy-oriented digital identity schemes, such as U-Prove and Idemix, have been proposed but face challenges in widespread adoption due to issues like compatibility and scalability. For that, Sovrin is a system that integrates anonymous credentials with revocation, emphasizing privacy, unforgeability, performance, and unlinkability. The implementation incorporates a distributed ledger inspired by Ethereum and Byzantine Fault Tolerant (BFT) protocols for scalability [66].

\ Sovrin employs anonymous credentials based on zeroknowledge proofs, providing unlinkability and features like delegation and revocation. Privacy concerns are associated with revocation, but in [40] paper, attribute-based sharding are proposed to enhance privacy during the revocation process(and closing the gap to IRMA). The revocation methods involve cryptographic accumulators for efficiency.

\ Overall, Sovrin aims to address privacy and security concerns in digital identity systems through its innovative design and implementation and states from its requirements ”selfsovereign identity, where every person, organization, or thing can have its own truly independent digital identity that no other person, company, or government can take away” [55]. Furthermore, the paper explains what most distinguishes Sovrin as a distributed identity system: it is the first public permissioned ledger. The stack of the technology has 3 important levels: Sovrin Ledger, Sovrin Agents and Sovrin Clients.

\ In a comparison between IRMA and Sovrin [48], adopting Sovrin is considered challenging for both service providers and credential users and, like the PKI, its commercial value can be overseen. At the same time, Sovrin is a complex project and still in progress with its documentation, being an open source, being somewhat scattered around. However, Sovrin has an advantage over IRMA in deployment in such that service providers do not need to host any server because of the Sovrin Ledger. Regarding the digital identity problem, Sovrin has been cited as a possible solution for the technology needed in such schemes [67].

\

:::info Authors:

(1) Adrian-Tudor Dumitrescu, Delft University of Technology, Delft, The Netherlands (A.T.Dumitrescu@student.tudelft.nl);

(2) Johan Pouwelse (thesis supervisor), Delft University of Technology, Delft, The Netherlands (J.A.Pouwelse@tudelft.nl).

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

\

Market Opportunity
PUBLIC Logo
PUBLIC Price(PUBLIC)
$0.01899
$0.01899$0.01899
-0.62%
USD
PUBLIC (PUBLIC) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Microsoft Corp. $MSFT blue box area offers a buying opportunity

Microsoft Corp. $MSFT blue box area offers a buying opportunity

The post Microsoft Corp. $MSFT blue box area offers a buying opportunity appeared on BitcoinEthereumNews.com. In today’s article, we’ll examine the recent performance of Microsoft Corp. ($MSFT) through the lens of Elliott Wave Theory. We’ll review how the rally from the April 07, 2025 low unfolded as a 5-wave impulse followed by a 3-swing correction (ABC) and discuss our forecast for the next move. Let’s dive into the structure and expectations for this stock. Five wave impulse structure + ABC + WXY correction $MSFT 8H Elliott Wave chart 9.04.2025 In the 8-hour Elliott Wave count from Sep 04, 2025, we saw that $MSFT completed a 5-wave impulsive cycle at red III. As expected, this initial wave prompted a pullback. We anticipated this pullback to unfold in 3 swings and find buyers in the equal legs area between $497.02 and $471.06 This setup aligns with a typical Elliott Wave correction pattern (ABC), in which the market pauses briefly before resuming its primary trend. $MSFT 8H Elliott Wave chart 7.14.2025 The update, 10 days later, shows the stock finding support from the equal legs area as predicted allowing traders to get risk free. The stock is expected to bounce towards 525 – 532 before deciding if the bounce is a connector or the next leg higher. A break into new ATHs will confirm the latter and can see it trade higher towards 570 – 593 area. Until then, traders should get risk free and protect their capital in case of a WXY double correction. Conclusion In conclusion, our Elliott Wave analysis of Microsoft Corp. ($MSFT) suggested that it remains supported against April 07, 2025 lows and bounce from the blue box area. In the meantime, keep an eye out for any corrective pullbacks that may offer entry opportunities. By applying Elliott Wave Theory, traders can better anticipate the structure of upcoming moves and enhance risk management in volatile markets. Source: https://www.fxstreet.com/news/microsoft-corp-msft-blue-box-area-offers-a-buying-opportunity-202509171323
Share
BitcoinEthereumNews2025/09/18 03:50
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32
Zero Knowledge Proof Sparks 300x Growth Discussion! Bitcoin Cash & Ethereum Cool Off

Zero Knowledge Proof Sparks 300x Growth Discussion! Bitcoin Cash & Ethereum Cool Off

Explore how Bitcoin Cash and Ethereum move sideways while Zero Knowledge Proof (ZKP) gains notice with a live presale auction, working infra, shipping Proof Pods
Share
CoinLive2026/01/18 07:00