Towards securing Public-Key Storage using Hyperledger Fabric

被引:2
|
作者
Dreyer, Julian [1 ]
Toenjes, Ralf [1 ]
Aschenbruck, Nils [2 ]
机构
[1] Univ Appl Sci Osnabruck, Osnabruck, Germany
[2] Osnabruck Univ, Osnabruck, Germany
来源
2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC 2022) | 2022年
关键词
D O I
10.1109/ICBC54727.2022.9805517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When given a cryptographic public verification key, a receiver needs to be sure about the authenticity of the sender. Whenever an adversary is able to replace a wellintended public verification key of one of two participants within a communication relationship, she is able to send maliciously signed messages, using her own secret key, thereby compromising the whole authorization system. To overcome these issues for small to medium-sized distributed sensor networks, we previously proposed the NFC-Key Exchange protocol. Using the NFC-KE challenge-response authorization scheme, an attacker will not be able to intercept any communication unless she is authorized by a centrally trusted authority. Though, the NFC-KE protocol considers only local file storages for the storing operations of the authorized public-keys. This approach is inherently vulnerable to any zero-day exploits that enable an attacker to infiltrate the filesystem. Additionally, once the central authority component is restarted or becomes corrupted, every previously exchanged key needs to be reauthenticated. By using the Distributed Ledger Technology (DLT) framework Hyperledger Fabric, this paper proposes a new extension concept for the NFC-KE protocol in order to enhance the security of the public-key store. By using this extension, the NFC-KE protocol gains increased tamperresistance and outage resilience, due to the decentralized nature of the DLT.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] PUBLIC-KEY PATENT
    BENNETT, R
    BYTE, 1985, 10 (07): : 16 - 16
  • [22] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [23] Public-key steganography
    von Ahn, L
    Hopper, NJ
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 323 - 341
  • [24] Securing M2M With Post-Quantum Public-Key Cryptography
    Shih, Jie-Ren
    Hu, Yongbo
    Hsiao, Ming-Chun
    Chen, Ming-Shing
    Shen, Wen-Chung
    Yang, Bo-Yin
    Wu, An-Yeu
    Cheng, Chen-Mou
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (01) : 106 - 116
  • [25] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [26] The impact of using CouchDB on Hyperledger Fabric performance for heterogeneous medical data storage
    Fernandes Spengler, Ana Caroline
    Lopes de Souza, Paulo Sergio
    2021 XLVII LATIN AMERICAN COMPUTING CONFERENCE (CLEI 2021), 2021,
  • [27] Decentralized Authorization using Hyperledger Fabric
    Vasishta, Muthukur Venkata Akhil
    Palanisamy, Balaji
    Sural, Shamik
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 238 - 243
  • [28] Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure
    Patsonakis, Christos
    Samari, Katerina
    Roussopoulos, Mema
    Kiayias, Aggelos
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 299 - 321
  • [29] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [30] Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments
    Vanstone, Scott A.
    Information Security Technical Report, 2 (02): : 78 - 87