Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge

Jie Zhang, Futai Zhang

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

In the new paradigm of blockchain-powered intelligent edge, the key agreement is a significant problem which has not been extensively studied so far. Existing key agreement protocols in the traditional public-key setting are usually too complicated and heavy for edge and end devices. Besides, most protocols in use do not have effective measures to resist side-channel attacks which are increasingly threatening cloud servers, edge devices and end devices. Identity (ID)-based protocols can be conveniently implemented in the blockchain-powered intelligent edge. Several leakage-resilient ID-based protocols which can resist side-channel attacks have been proposed. However, they all involve time-consuming pairing computations. Besides, none of them address side-channel attacks to the key generation center (KGC). This paper designs and realizes two novel ID-based key agreement protocols for the blockchain-powered intelligent edge, including an extended Canetti-Krawczyk (eCK) secure ID-based authenticated key agreement (AKA) protocol and a continuous after-the-fact leakage-resilient eCK (CAFL-eCK) secure ID-based AKA protocol. Both protocols do not involve any heavy pairing computation. Besides, the second one can resist side-channel attacks to the KGC and the communicating parties. A hybrid implementation of the two protocols can achieve high efficiency and strong security at the same time in blockchain-powered intelligent edge environments. This is demonstrated via a use case of a blockchain-powered smart home.

Original languageEnglish
JournalIEEE Internet of Things Journal
DOIs
Publication statusAccepted/In press - 2021
Externally publishedYes

Keywords

  • blockchain
  • Blockchains
  • Cloud computing
  • Computational modeling
  • identity-based key agreement
  • intelligent edge
  • intelligent Internet of Things.
  • leakage resilience
  • Protocols
  • Resists
  • Security
  • Side-channel attacks
  • side-channel attacks

Fingerprint

Dive into the research topics of 'Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge'. Together they form a unique fingerprint.

Cite this