Towards securing Public-Key Storage using Hyperledger Fabric

被引:2
|
作者
Dreyer, Julian [1 ]
Toenjes, Ralf [1 ]
Aschenbruck, Nils [2 ]
机构
[1] Univ Appl Sci Osnabruck, Osnabruck, Germany
[2] Osnabruck Univ, Osnabruck, Germany
来源
2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC 2022) | 2022年
关键词
D O I
10.1109/ICBC54727.2022.9805517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When given a cryptographic public verification key, a receiver needs to be sure about the authenticity of the sender. Whenever an adversary is able to replace a wellintended public verification key of one of two participants within a communication relationship, she is able to send maliciously signed messages, using her own secret key, thereby compromising the whole authorization system. To overcome these issues for small to medium-sized distributed sensor networks, we previously proposed the NFC-Key Exchange protocol. Using the NFC-KE challenge-response authorization scheme, an attacker will not be able to intercept any communication unless she is authorized by a centrally trusted authority. Though, the NFC-KE protocol considers only local file storages for the storing operations of the authorized public-keys. This approach is inherently vulnerable to any zero-day exploits that enable an attacker to infiltrate the filesystem. Additionally, once the central authority component is restarted or becomes corrupted, every previously exchanged key needs to be reauthenticated. By using the Distributed Ledger Technology (DLT) framework Hyperledger Fabric, this paper proposes a new extension concept for the NFC-KE protocol in order to enhance the security of the public-key store. By using this extension, the NFC-KE protocol gains increased tamperresistance and outage resilience, due to the decentralized nature of the DLT.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric
    Sinha, Amisha
    Sadhya, Debanjan
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 554 - 559
  • [2] Securing networked image transmission using public-key cryptography and identity authentication
    Gowda, V. Dankan
    Kumar, Pullela S. V. V. S. R.
    Latha, J.
    Selvakumar, C.
    Shekhar, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 779 - 791
  • [3] Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
    Honar Pajooh, Houshyar
    Rashid, Mohammad
    Alam, Fakhrul
    Demidenko, Serge
    SENSORS, 2021, 21 (02) : 1 - 29
  • [4] Decentralizing IoT Public-Key Storage using Distributed Ledger Technology
    Dreyer, Julian
    Toenjes, Ralf
    Aschenbruck, Nils
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 172 - 177
  • [5] Towards a better applicability of public-key certificates
    Hamdy, Safuat
    2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 119 - 123
  • [6] Towards achieving confidentiality in Hyperledger Fabric
    Hofmann, Benedikt
    Kasinathan, Prabhakaran
    Wimmer, Martin
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 384 - 391
  • [7] Towards an FPGA architecture optimized for public-key algorithms
    Elbirt, AJ
    Paar, C
    RECONFIGURABLE TECHNOLOGY: FPGAS FOR COMPUTING AND APPLICATIONS, 1999, 3844 : 33 - 42
  • [8] Towards Sustainable Evolution for the TLS Public-Key Infrastructure
    Lee, Taeho
    Pappas, Christos
    Szalachowski, Pawel
    Perrig, Adrian
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 637 - 649
  • [9] Towards logically and physically secure public-key infrastructures
    Viswanathan, K
    Saxena, A
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134
  • [10] Transitioning to a Hyperledger Fabric Hybrid Quantum Resistant-Classical Public Key Infrastructure
    Campbell, Robert E.
    JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2019, 2 (02): : 15 - 25