Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Partyopen access
- Authors
- Kemmoe, Victor Youdom; Kwon, Yongseok; Hussain, Rasheed; Cho, Sunghyun; Son, Junggab
- Issue Date
- Jul-2023
- Publisher
- IEEE COMPUTER SOC
- Keywords
- Asynchronous GKE; blockchain; group key exchange (GKE); Internet of Things; perfect forward secrecy (PFS); post-compromised security; security; smart contract
- Citation
- IEEE Transactions on Dependable and Secure Computing , v.20, no.4, pp 3176 - 3193
- Pages
- 18
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE Transactions on Dependable and Secure Computing
- Volume
- 20
- Number
- 4
- Start Page
- 3176
- End Page
- 3193
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/114395
- DOI
- 10.1109/TDSC.2022.3189977
- ISSN
- 1545-5971
1941-0018
- Abstract
- Group Key Exchange (GKE) is an important tool to develop secure multi-user applications such as group text messages, ad-hoc networks, and so on. Most of the currently deployed GKE schemes are synchronous, i.e., they require all the participants to be online during their execution. However, with more battery-powered devices being used in such applications, the synchronicity requirement is challenging to fulfill. To fill the gaps, asynchronous GKE schemes have been introduced in the literature. Nevertheless, the currently available asynchronous and synchronous GKE schemes rely on Trusted Third Parties (TTPs) for key establishment and management. To this end, reliance on TTPs is a serious shortcoming since TTPs are well known to be the single point of failure. Furthermore, the existing GKE schemes require participants to perform all computations, which can degrade the performance of resource-constrained devices such as Internet of Things (IoT) devices. To solve these problems, in this paper, we propose an asynchronous GKE scheme that uses blockchain and smart contracts to store the security keys-related material and reduce the computational load of the participants. Furthermore, our proposed scheme provides Perfect Forward Secrecy (PFS) and Post-Compromised Security (PCS). Our implementation on Ethereum shows that the proposed scheme can scale to more than 100 participants when combined with a distributed storage system.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.