Key Exchange with the Help of a Public Ledger

Thanh Bui, Tuomas Aura

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

4 Citations (Scopus)


Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols.
Original languageEnglish
Title of host publicationSecurity Protocols XXV
Subtitle of host publication25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers
EditorsFrank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás
Place of PublicationCham
Number of pages14
ISBN (Electronic)978-3-319-71075-4
ISBN (Print)978-3-319-71074-7
Publication statusPublished - 2017
MoE publication typeA3 Book section, Chapters in research books
EventInternational Security Protocols Workshop - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017
Conference number: 25

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


WorkshopInternational Security Protocols Workshop
Country/TerritoryUnited Kingdom


Dive into the research topics of 'Key Exchange with the Help of a Public Ledger'. Together they form a unique fingerprint.

Cite this