Anonymity and pseudonymity are important concepts in the domain of the Internet of Things. The existing privacy-preserving key agreement schemes are only concerned with maintaining the privacy of the communicated data that appears on the channel established between two honest entities. However, privacy should also include anonymity or pseudonymity of the device identity. This means there should not exist any correlation handle to associate different communications done by the device. This paper proposes a privacy-preserving key agreement method called the Pseudoonymous Authenticated Key Agreement Protocol (PAKA), which also provides device unlinkability across different domains. This protocol is based on an Elliptic-Curve Diffie-Hellman using standard cryptographic primitives and curves, i.e., no pairing-based cryptography or other computationally intensive cryptography is necessary. For the security analysis, we provide a mathematical proof and an automatic cryptographic protocol verification utilizing Proverif. Last, we show the integration with the Trusted Platform Module and a Proof-of-Concept implementation.

PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography / Schermann, Raphael; Bussa, Simone; Urian, Rainer; Toegl, Ronald; Steger, Christian. - (2024), pp. 1-10. (Intervento presentato al convegno ARES 2024: The 19th International Conference on Availability, Reliability and Security tenutosi a Vienna (AT) nel 30 July 2024- 2 August 2024) [10.1145/3664476.3669925].

PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography

Bussa, Simone;
2024

Abstract

Anonymity and pseudonymity are important concepts in the domain of the Internet of Things. The existing privacy-preserving key agreement schemes are only concerned with maintaining the privacy of the communicated data that appears on the channel established between two honest entities. However, privacy should also include anonymity or pseudonymity of the device identity. This means there should not exist any correlation handle to associate different communications done by the device. This paper proposes a privacy-preserving key agreement method called the Pseudoonymous Authenticated Key Agreement Protocol (PAKA), which also provides device unlinkability across different domains. This protocol is based on an Elliptic-Curve Diffie-Hellman using standard cryptographic primitives and curves, i.e., no pairing-based cryptography or other computationally intensive cryptography is necessary. For the security analysis, we provide a mathematical proof and an automatic cryptographic protocol verification utilizing Proverif. Last, we show the integration with the Trusted Platform Module and a Proof-of-Concept implementation.
2024
979-8-4007-1718-5
File in questo prodotto:
File Dimensione Formato  
3664476.3669925.pdf

accesso aperto

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Creative commons
Dimensione 782.9 kB
Formato Adobe PDF
782.9 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2992493