Abstrakti
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols.
Alkuperäiskieli | Englanti |
---|---|
Otsikko | Security Protocols XXV |
Alaotsikko | 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers |
Toimittajat | Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás |
Julkaisupaikka | Cham |
Kustantaja | SPRINGER |
Sivut | 123-136 |
Sivumäärä | 14 |
ISBN (elektroninen) | 978-3-319-71075-4 |
ISBN (painettu) | 978-3-319-71074-7 |
DOI - pysyväislinkit | |
Tila | Julkaistu - 2017 |
OKM-julkaisutyyppi | A3 Kirjan osa tai toinen tutkimuskirja |
Tapahtuma | International Security Protocols Workshop - Cambridge, Iso-Britannia Kesto: 20 maalisk. 2017 → 22 maalisk. 2017 Konferenssinumero: 25 |
Julkaisusarja
Nimi | Lecture Notes in Computer Science |
---|---|
Kustantaja | Springer |
Vuosikerta | 10476 |
ISSN (painettu) | 0302-9743 |
ISSN (elektroninen) | 1611-3349 |
Workshop
Workshop | International Security Protocols Workshop |
---|---|
Maa/Alue | Iso-Britannia |
Kaupunki | Cambridge |
Ajanjakso | 20/03/2017 → 22/03/2017 |