Publication: A Technique of Protocol Construction for Detecting Compromises of Secret Keys
Дата
2020
Авторы
Journal Title
Journal ISSN
Volume Title
Издатель
Аннотация
© 2020 IEEE.Currently a single user often utilizes multiple devices to get access to applications, for example, messengers. A way to provide the necessary level of information security is monitoring the legitimacy of using client devices according to a set of access rights. In this paper, we suggest a cryptographic protocol for detecting compromises of secret keys based on blockchain technology. In contrast with currently available solutions, the blockchain-based protocol allows controlling usage of all long-term cryptographic keys, as well as every key in a chain of short-term keys. Besides that, an additional audit service can be used for monitoring secure messaging protocols. Moreover, the protocol includes an authentication service for users. All these techniques make the idea of blockchain-based protocol promising.
Описание
Ключевые слова
Цитирование
Kiryakina, M. A Technique of Protocol Construction for Detecting Compromises of Secret Keys / Kiryakina, M., Kuzmicheva, S., Zapechnikov, S. // 2020 5th International Conference on Information Technologies in Engineering Education, Inforino 2020 - Proceedings. - 2020. - 10.1109/Inforino48376.2020.9111858