Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge

被引:3
|
作者
Zhang, Jie [1 ]
Zhang, Futai [2 ]
机构
[1] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 09期
基金
中国国家自然科学基金;
关键词
Protocols; Security; Blockchains; Side-channel attacks; Cloud computing; Resists; Computational modeling; Blockchain; identity-based key agreement; intelligent edge; intelligent Internet of Things (IIoT); leakage resilience; side-channel attacks; PROTOCOL; EXCHANGE; SECURE;
D O I
10.1109/JIOT.2021.3111552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the new paradigm of blockchain-powered intelligent edge, the key agreement is a significant problem that has not been extensively studied so far. Existing key agreement protocols in the traditional public-key setting are usually too complicated and heavy for edge and end devices. Besides, most protocols in use do not have effective measures to resist side-channel attacks, which are increasingly threatening cloud servers, edge devices, and end devices. Identity (ID)-based protocols can be conveniently implemented in the blockchain-powered intelligent edge. Several leakage-resilient ID-based protocols, which can resist side-channel attacks, have been proposed. However, they all involve time-consuming pairing computations. Besides, none of them address side-channel attacks to the key generation center (KGC). This article designs and realizes two novel ID-based key agreement protocols for the blockchain-powered intelligent edge, including an extended Canetti-Krawczyk (eCK) secure ID-based authenticated key agreement (AKA) protocol and a continuous after-the-fact leakage-resilient eCK (CAFL-eCK) secure ID-based AKA protocol. Both protocols do not involve any heavy pairing computation. Besides, the second one can resist side-channel attacks to the KGC and the communicating parties. A hybrid implementation of the two protocols can achieve high efficiency and strong security at the same time in blockchain-powered intelligent edge environments. This is demonstrated via a use case of a blockchain-powered smart home.
引用
收藏
页码:6688 / 6702
页数:15
相关论文
共 50 条
  • [1] Interdomain Identity-Based Key Agreement Schemes
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Tuan-Hung
    Hsu, Ruei-Hau
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [2] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    [J]. EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [3] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [4] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [5] Implementing Identity-based Key Agreement in Embedded Devices
    Schmid, Giovanni
    Rossi, Francesco
    [J]. PECCS 2015 PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2015, : 117 - 123
  • [6] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [7] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    [J]. International Journal of Information Security, 2007, 6 : 213 - 241
  • [8] Identity-based key agreement with unilateral identity privacy using pairings
    Cheng, Zhaohui
    Chen, Liqun
    Comley, Richard
    Tang, Qiang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 202 - 213
  • [9] Identity-based key agreement protocols in a multiple PKG environment
    Lee, H
    Kim, D
    Kim, S
    Oh, H
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 877 - 886
  • [10] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519