Towards securing Public-Key Storage using Hyperledger Fabric

被引:2
作者
Dreyer, Julian [1 ]
Toenjes, Ralf [1 ]
Aschenbruck, Nils [2 ]
机构
[1] Univ Appl Sci Osnabruck, Osnabruck, Germany
[2] Osnabruck Univ, Osnabruck, Germany
来源
2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC 2022) | 2022年
关键词
D O I
10.1109/ICBC54727.2022.9805517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When given a cryptographic public verification key, a receiver needs to be sure about the authenticity of the sender. Whenever an adversary is able to replace a wellintended public verification key of one of two participants within a communication relationship, she is able to send maliciously signed messages, using her own secret key, thereby compromising the whole authorization system. To overcome these issues for small to medium-sized distributed sensor networks, we previously proposed the NFC-Key Exchange protocol. Using the NFC-KE challenge-response authorization scheme, an attacker will not be able to intercept any communication unless she is authorized by a centrally trusted authority. Though, the NFC-KE protocol considers only local file storages for the storing operations of the authorized public-keys. This approach is inherently vulnerable to any zero-day exploits that enable an attacker to infiltrate the filesystem. Additionally, once the central authority component is restarted or becomes corrupted, every previously exchanged key needs to be reauthenticated. By using the Distributed Ledger Technology (DLT) framework Hyperledger Fabric, this paper proposes a new extension concept for the NFC-KE protocol in order to enhance the security of the public-key store. By using this extension, the NFC-KE protocol gains increased tamperresistance and outage resilience, due to the decentralized nature of the DLT.
引用
收藏
页数:3
相关论文
共 50 条
  • [31] Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments
    Vanstone, Scott A.
    Information Security Technical Report, 2 (02): : 78 - 87
  • [32] A Public-Key Cryptosystem Using Purely Cubic Fields
    R. Scheidler
    Journal of Cryptology, 1998, 11 : 109 - 124
  • [33] Public-Key Infrastructure for Smart Meters using Blockchains
    Melo, Wilson, Jr.
    Machado, Raphael C. S.
    Peters, Daniel
    Moni, Mahbuba
    2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), 2020, : 429 - 434
  • [34] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [35] Prepaid electronic cheques using public-key certificates
    Radu, C
    Govaerts, R
    Vandewalle, J
    CRYPTOGRAPHY AND CODING: 5TH IMA CONFERENCE, 1995, 1025 : 132 - 141
  • [36] PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density
    Ping, Yuan
    Wang, Baocang
    Tian, Shengli
    Zhou, Jingxian
    Ma, Hui
    INFORMATION, 2019, 10 (02)
  • [37] An efficient public-key framework
    Zhou, JY
    Bao, F
    Deng, R
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 88 - 99
  • [38] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [39] The cubic public-key transformation
    Kak, Subhash
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2007, 26 (03) : 353 - 359
  • [40] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12