Key Exchange with the Help of a Public Ledger (Transcript of Discussion)

نویسنده

  • Thanh Bui
چکیده

Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)

In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...

متن کامل

Asynchronous Online Discussion Forum: A Key to Enhancing Students’ Writing Ability and Attitudes in Iran

This paper focuses on the impact of an asynchronous online discussion forum on the development of students’ ability in and attitudes toward writing in English. Two groups of third-year students (N = 60) majoring in English were assigned to two treatment and control groups, each receiving different types of feedback. Students in the treatment group were required to participate ...

متن کامل

Governance in Health – The Need for Exchange and Evidence; Comment on “Governance, Government, and the Search for New Provider Models”

Governance in health is cited as one of the key factors in balancing the concerns of the government and public sector with the interests of civil society/private players, but often remains poorly described and operationalized. Richard Saltman and Antonio Duran look at two aspects in the search for new provider models in a context of health markets signalling liberalisation: (i) the role of the ...

متن کامل

I-15: Assessment of Transcript and Protein Profiles of Infertile Individual May Help to Select Individuals with Low Fertilization Potential Candidate of Artificial Oocyte Activation

Background Following sperm penetration, oocyte is activated by sperm oocyte activating factors (SOAFs) released by sperm. Spermspecific phospholipase C isoform ζ (PLCζ) and post acrosomal WW binding protein (PAWP) are two nominees for the SOAF. PLCζ is located back-to-back with another testis-specific gene called CAPZA3. These two genes share a common bidirectional promoter. In this study we as...

متن کامل

Not Up for Discussion: Applying Lukes’ Power Model to the Study of Health System Corruption; Comment on “We Need to Talk About Corruption in Health Systems”

This companion paper suggests the potential benefits of applying Steven Lukes’ dimensions of power model to the study of corruption in health systems. Lukes’ model sets out three “faces of power” classified by their influence on political discourse, resulting in overt, covert and latent discussion of issues depending on the degree of their alignment with the agenda of d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017