Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge



Zhang, Jie ORCID: 0000-0003-1258-9679 and Zhang, Futai
(2021) Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge. IEEE Internet of Things Journal, 9 (9). p. 1.

[img] Text
ManuscriptInPDF.pdf - Author Accepted Manuscript

Download (1MB) | Preview

Abstract

In the new paradigm of blockchain-powered intelligent edge, the key agreement is a significant problem that has not been extensively studied so far. Existing key agreement protocols in the traditional public-key setting are usually too complicated and heavy for edge and end devices. Besides, most protocols in use do not have effective measures to resist side-channel attacks, which are increasingly threatening cloud servers, edge devices, and end devices. Identity (ID)-based protocols can be conveniently implemented in the blockchain-powered intelligent edge. Several leakage-resilient ID-based protocols, which can resist side-channel attacks, have been proposed. However, they all involve time-consuming pairing computations. Besides, none of them address side-channel attacks to the key generation center (KGC). This article designs and realizes two novel ID-based key agreement protocols for the blockchain-powered intelligent edge, including an extended Canetti-Krawczyk (eCK) secure ID-based authenticated key agreement (AKA) protocol and a continuous after-the-fact leakage-resilient eCK (CAFL-eCK) secure ID-based AKA protocol. Both protocols do not involve any heavy pairing computation. Besides, the second one can resist side-channel attacks to the KGC and the communicating parties. A hybrid implementation of the two protocols can achieve high efficiency and strong security at the same time in blockchain-powered intelligent edge environments. This is demonstrated via a use case of a blockchain-powered smart home.

Item Type: Article
Uncontrolled Keywords: Protocols, Security, Blockchains, Side-channel attacks, Cloud computing, Resists, Computational modeling, Blockchain, identity-based key agreement, intelligent edge, intelligent Internet of Things (IIoT), leakage resilience, side-channel attacks
Depositing User: Symplectic Admin
Date Deposited: 30 Sep 2021 07:35
Last Modified: 15 Mar 2024 13:11
DOI: 10.1109/jiot.2021.3111552
Related URLs:
URI: https://livrepository.liverpool.ac.uk/id/eprint/3138755