Abstract
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols.
Original language | English |
---|---|
Title of host publication | Security Protocols XXV |
Subtitle of host publication | 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers |
Editors | Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás |
Place of Publication | Cham |
Publisher | SPRINGER |
Pages | 123-136 |
Number of pages | 14 |
ISBN (Electronic) | 978-3-319-71075-4 |
ISBN (Print) | 978-3-319-71074-7 |
DOIs | |
Publication status | Published - 2017 |
MoE publication type | A3 Part of a book or another research book |
Event | International Security Protocols Workshop - Cambridge, United Kingdom Duration: 20 Mar 2017 → 22 Mar 2017 Conference number: 25 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 10476 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | International Security Protocols Workshop |
---|---|
Country/Territory | United Kingdom |
City | Cambridge |
Period | 20/03/2017 → 22/03/2017 |