Anonymity and pseudonymity are important concepts in the domain of the Internet of Things. The existing privacy-preserving key agreement schemes are only concerned with maintaining the privacy of the communicated data that appears on the channel established between two honest entities. However, privacy should also include anonymity or pseudonymity of the device identity. This means there should not exist any correlation handle to associate different communications done by the device. This paper proposes a privacy-preserving key agreement method called the Pseudoonymous Authenticated Key Agreement Protocol (PAKA), which also provides device unlinkability across different domains. This protocol is based on an Elliptic-Curve Diffie-Hellman using standard cryptographic primitives and curves, i.e., no pairing-based cryptography or other computationally intensive cryptography is necessary. For the security analysis, we provide a mathematical proof and an automatic cryptographic protocol verification utilizing Proverif. Last, we show the integration with the Trusted Platform Module and a Proof-of-Concept implementation.
PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography / Schermann, Raphael; Bussa, Simone; Urian, Rainer; Toegl, Ronald; Steger, Christian. - (2024), pp. 1-10. (Intervento presentato al convegno ARES 2024: The 19th International Conference on Availability, Reliability and Security tenutosi a Vienna (AT) nel 30 July 2024- 2 August 2024) [10.1145/3664476.3669925].
PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography
Bussa, Simone;
2024
Abstract
Anonymity and pseudonymity are important concepts in the domain of the Internet of Things. The existing privacy-preserving key agreement schemes are only concerned with maintaining the privacy of the communicated data that appears on the channel established between two honest entities. However, privacy should also include anonymity or pseudonymity of the device identity. This means there should not exist any correlation handle to associate different communications done by the device. This paper proposes a privacy-preserving key agreement method called the Pseudoonymous Authenticated Key Agreement Protocol (PAKA), which also provides device unlinkability across different domains. This protocol is based on an Elliptic-Curve Diffie-Hellman using standard cryptographic primitives and curves, i.e., no pairing-based cryptography or other computationally intensive cryptography is necessary. For the security analysis, we provide a mathematical proof and an automatic cryptographic protocol verification utilizing Proverif. Last, we show the integration with the Trusted Platform Module and a Proof-of-Concept implementation.File | Dimensione | Formato | |
---|---|---|---|
3664476.3669925.pdf
accesso aperto
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Creative commons
Dimensione
782.9 kB
Formato
Adobe PDF
|
782.9 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2992493