Key Exchange with the Help of a Public Ledger

Thanh Bui, Tuomas Aura

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

3 Citations (Scopus)

Abstract

Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols.
Original languageEnglish
Title of host publicationSecurity Protocols XXV
Subtitle of host publication25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers
EditorsFrank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás
Place of PublicationCham
PublisherSPRINGER
Pages123-136
Number of pages14
ISBN (Electronic)978-3-319-71075-4
ISBN (Print)978-3-319-71074-7
DOIs
Publication statusPublished - 2017
MoE publication typeA3 Part of a book or another research book
EventInternational Security Protocols Workshop - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017
Conference number: 25

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10476
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

WorkshopInternational Security Protocols Workshop
Country/TerritoryUnited Kingdom
CityCambridge
Period20/03/201722/03/2017

Fingerprint

Dive into the research topics of 'Key Exchange with the Help of a Public Ledger'. Together they form a unique fingerprint.

Cite this