Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge

Jie Zhang, Futai Zhang*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)

Abstract

In the new paradigm of blockchain-powered intelligent edge, the key agreement is a significant problem that has not been extensively studied so far. Existing key agreement protocols in the traditional public-key setting are usually too complicated and heavy for edge and end devices. Besides, most protocols in use do not have effective measures to resist side-channel attacks, which are increasingly threatening cloud servers, edge devices, and end devices. Identity (ID)-based protocols can be conveniently implemented in the blockchain-powered intelligent edge. Several leakage-resilient ID-based protocols, which can resist side-channel attacks, have been proposed. However, they all involve time-consuming pairing computations. Besides, none of them address side-channel attacks to the key generation center (KGC). This article designs and realizes two novel ID-based key agreement protocols for the blockchain-powered intelligent edge, including an extended Canetti-Krawczyk (eCK) secure ID-based authenticated key agreement (AKA) protocol and a continuous after-the-fact leakage-resilient eCK (CAFL-eCK) secure ID-based AKA protocol. Both protocols do not involve any heavy pairing computation. Besides, the second one can resist side-channel attacks to the KGC and the communicating parties. A hybrid implementation of the two protocols can achieve high efficiency and strong security at the same time in blockchain-powered intelligent edge environments. This is demonstrated via a use case of a blockchain-powered smart home.

Original languageEnglish
Pages (from-to)6688-6702
Number of pages15
JournalIEEE Internet of Things Journal
Volume9
Issue number9
DOIs
Publication statusPublished - 1 May 2022

Keywords

  • Blockchain
  • Identity-based key agreement
  • Intelligent Internet of Things (IIoT)
  • Intelligent edge
  • Leakage resilience
  • Side-channel attacks

Fingerprint

Dive into the research topics of 'Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge'. Together they form a unique fingerprint.

Cite this