atomic  verification  mechanism  integrated  with  the 
Bitcoin system at the protocol level inherits the trust 
from the system. The limitation that a certificate can 
only be verified once is mitigated by having multiple 
outpoints representing the same certificate.  
The  commonalities  between  a  certificate 
management system and the Bitcoin system allow us 
to  delegate  a  significant  amount  of  work  to  the 
Bitcoin system and achieve great savings for the 
certificate management system. The extra gain is the 
security that is induced by the proof of work, which 
prevents the history from being malleated even when 
CA’s private key is compromised.  
ACKNOWLEDGEMENTS 
The  authors  would  like  to  thank  K.  Molloy,  M.  S. 
Kiraz  and  O.  Vaughan  for  their  invaluable 
contributions  to  the  paper.  In  addition,  the  authors 
gratefully  acknowledge  the  reviewers  of  the 
SECRYPT conference for their insightful feedback. 
C. Tartan would like to thank T. Tartan and E. Parry 
for the fruitful discussions. W. Zhang would like to 
thank J. Zhang and A. Zhu for their sweet support. 
REFERENCES 
Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless 
Public Key Cryptography. International Conference on 
the Theory and Application of Cryptology and 
Information Security (pp. 452-473). Springer. 
Axon,  L.,  &  Goldsmith,  M.  (2017).  PB-PKI:  A  Privacy-
Aware Blockchain-Based PKI. Proceedings of the 14th 
International Joint Conference on e-Business and 
Telecommunications (pp. 311-318). SECRYPT. 
Bitcoin  SV.  (2021).  Bitcoin SV node software.  Retrieved 
from Github: https://github.com/bitcoin-sv/bitcoin-sv 
Blagov,  N.,  &  Helm,  M.  (2020).  State  of  the  Certificate 
Transparency  Ecosystem.  Network Architectures and 
Services, 43-48. 
Blockchair. (2020). Bitcoin SV block with over 1.3 millions 
transactions.  Retrieved  from  Blockchair: 
https://blockchair.com/bitcoin-sv/block/635141 
Blockchair. (2021). Bitcoin SV Average Transaction Fee. 
Retrieved  from  Blockchair:  https://blockchair.com/ 
bitcoin-sv/charts/average-transaction-fee-usd 
Boneh,  D.,  &  Franklin,  M.  (2001).  Identity-Based 
Encryption from the Weil Pairing. Annual International 
Cryptology Conference (pp. 213-229). Springer. 
Boneh,  D.,  Lynn,  B.,  &  Shacham,  H.  (2001).  Short 
Signatures  from  the  Weil  Pairing.  International 
Conference on the Theory and Application of 
Cryptology and Information Security  (pp.  514-532). 
Springer. 
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & 
Thayer,  R.  (2007,  November).  RFC 4880: OpenPGP 
Message Format.  Retrieved  from  Request  for 
Comments. IETF.: https://tools.ietf.org/html/rfc4880 
CERT Division. (2001). 2001 CERT Advisories. Software 
Engineering  Institute,  Carnegie  Mellon  University. 
Retrieved  from  https://resources.sei.cmu.edu/ 
asset_files/WhitePaper/2001_019_001_496192.pdf 
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, 
R.,  &  Polk,  W.  T.  (2008,  May).  RFC 5280: Internet 
X.509 Public Key Infrastructure Certificate and 
Certificate Revocation List (CRL) Profile.  Retrieved 
from  Request  for  Comments.  IETF.: 
https://tools.ietf.org/html/rfc5280 
Council  of  EU.  (2018).  Factsheet - 5th Anti Money 
Laundering Directive . Retrieved from Official Website 
of  European  Union:  https://ec.europa.eu/info/files/ 
factsheet-main-changes-5th-anti-money-laundering-
directive_en 
DigiCert. (2021). SCT Delivery. Retrieved from Certificate 
Transparency:  https://www.digicert.com/faq/ 
certificate-transparency/enabling-ct.htm 
Eastlake,  D.  3.  (2011,  January).  RFC 6066: Transport 
Layer Security (TLS) Extensions: Extension 
Definitions.  Retrieved  from  Request  for  Comments. 
IETF.: https://tools.ietf.org/html/rfc6066 
Etherscan.  (2020).  Ethereum Average Gas Price Chart. 
Retrieved  from  Etherscan:  https://etherscan.io/ 
chart/gasprice 
Fromknecht,  C.,  Velicanu,  D.,  &  Yakoubov,  S.  (2014, 
May).  CertCoin: A NameCoin Based Decentralized 
Authentication System.  Retrieved  from  Technical 
Report  MIT:  https://courses.csail.mit.edu/6.857/ 
2014/files/19-fromknecht-velicann-yakoubov-
certcoin.pdf 
Galbraith, S., Paterson, K., & Smart, N. (2008). Pairings for 
Cryptographers. Discrete Appl. Math. 156 (16), 3113-
3121. 
Gennaro,  R.,  &  Goldfeder,  S.  (2018).  Fast  Multiparty 
Threshold  ECDSA  with  Fast  Trustless  Setup. 
Conference on Computer and Communications 
Security (pp. 1179-1194). ACM SIGSAC. 
Google. (2013). Retrieved from Certificate Transparency: 
https://sites.google.com/site/certificatetransparency/ 
Google. (2021). Working together to detect maliciously or 
mistakenly issued certificates.  Retrieved  from 
Certificate  Transparency:  https://certificate. 
transparency.dev/ 
Hallam-Baker,  P.  (2015,  October).  RFC 7633: X.509v3 
Transport Layer Security (TLS) Feature Extension. 
Retrieved  from  Request  for  Comments.  IETF.: 
https://tools.ietf.org/html/rfc7633 
Hoogstraaten,  H.  (2012).  Black Tulip Report of the 
investigation into the DigiNotar Certificate . Technical 
Report. Fox-IT BV. 
IdenTrust  Services.  (2021,  March).  IdenTrust  Global 
Common  Certificate Policy.  Page  91.  Retrieved  from 
https://www.identrust.com/sites/default/files/resources
/IGC-CP-v1.5.3_03012021.pdf 
Kubilay,  M.  Y.,  Kiraz,  M.  S.,  &  Mantar,  H.  A.  (2019).