Certificateless authenticated key agreement for blockchain-based WBANs

被引:40
|
作者
Mwitende, Gervais [1 ]
Ye, Yalan [1 ]
Ali, Ikram [1 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
WBAN; CLAKA; Session key; Blockchain; Ring signature; SCHEME;
D O I
10.1016/j.sysarc.2020.101777
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement (AKA) enables communicating parties to mutually establish a session key, in a way that each entity is assured of the authentication of its peer. Certificateless AKA (CLAKA) protocols are widely designed since they avoid the key escrow problem found in identity-based systems and overcome certificateless management overheads in Public Key Infrastructure (PKI). Furthermore, the existing CLAKA were designed to operate in centralized network. Such architecture is a single point of management and single point of failure. We need lightweight protocols that fit with body sensors capabilities. In order to mitigate the aforementioned vulnerabilities, we propose a pairing-based certificateless against the key escrow problem. Our protocol operates in a decentralized system against the single point of failure and management. The protocol establishes a session key in the first phase for communications. The ring signature is used in the second phase for node authentication. The ring signature has advantage of reducing computation costs where a node signs a signature on behalf of others. The signing node remains anonymous and other nodes can verify the signature. Another advantage of ring signature is that there is no specification about the size of the group.
引用
收藏
页数:13
相关论文
共 50 条
  • [11] Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
    Li, Chaoyang
    Guo, Yanbu
    Dong, Mianxiong
    Xu, Gang
    Chen, Xiu-Bo
    Li, Jian
    Ota, Kaoru
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 2043 - 2059
  • [12] An Improved Certificateless Authenticated Key Agreement Protocol
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 26 - 30
  • [13] Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 574 - 577
  • [14] Certificateless and identity-based authenticated asymmetric group key agreement
    Lei Zhang
    Qianhong Wu
    Bo Qin
    Hua Deng
    Jiangtao Li
    Jianwei Liu
    Wenchang Shi
    International Journal of Information Security, 2017, 16 : 559 - 576
  • [15] Certificateless and identity-based authenticated asymmetric group key agreement
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Deng, Hua
    Li, Jiangtao
    Liu, Jianwei
    Shi, Wenchang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 559 - 576
  • [16] A Certificateless Authenticated Key Agreement Scheme for the Power IoT
    Cui, Wenchao
    Cheng, Rui
    Wu, Kehe
    Su, Yuling
    Lei, Yuqing
    ENERGIES, 2021, 14 (19)
  • [17] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [18] A Framework of Blockchain-Based Security for WBANs
    Deng, Han
    Meng, Xiangwei
    Guo, Jun
    Xi, Erhui
    Zhao, Hui
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 75 - 80
  • [19] Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
    Sun, Yanzhong
    Du, Xiaoni
    Niu, Shufen
    Yang, Xiaodong
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 139 (03): : 3287 - 3310
  • [20] Authenticated Key Agreement protocol for Virtual Private Network based on Certificateless Cryptography
    Eldewahi, Abeer
    Basheir, Eihab
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 269 - 273