Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Key Management Scheme for Public Key Cryptography Using Blockchain Network  
  Authors : S. Rajyalaxmi
  Cite as:

 

Efficient and secure key management could be a challenge for cryptographic system. Therefore, management of keys is one of the most critical components of the cryptographic system. No infrastructure is secure, without keys to be secure. Public-key cryptography is an important security framework used to provide the authentication and the confidentiality. Authentication and Confidentiality are most critical services in almost all current network applications because of huge amount of data being processed over the networks. These services are currently managed by centralized controller called certificate-authority. Therefore, the services are prone to attacks on the centralized controller. So, we propose key management scheme for public key cryptography using blockchain Network to resolve issues with centralization. This can be possible only due to the presence of the consensus protocol which could be a core a part of Blockchain network. This paper also presents the concept of structure, types and operation of Blockchain.

 

Published In : IJCSN Journal Volume 9, Issue 5

Date of Publication : October 2020

Pages : 225-231

Figures :12

Tables : --

 

S.Rajyalaxmi : received MTech in Computer Science and Engineering from Osmania University, Hyderabad in 2013. Thereafter, she has 15 years of experience from Academia. She is currently an Assistant Professor with the vasavi college of engineering. Her research interests include Computer networks, Cryptography and Network Security and also Blockchain.

 

Block chain, Key Management, Public key cryptography, Consensus Protocol

In this paper, we presented a blockchain structure and its working process in providing distributed security services. These services include entity authentication, confidentiality, and integrity assurances. The authentication, the confidentiality and integrity might be achieved by the public key cryptography using encryption method and the digital signature schemes. Thus, we discussed different blockchain-based key management for public key cryptography. There are still many open issues that need to be further researched and analyzed. Examples of these open issues include privacy, scalability, energy issues, and integration with other systems. The future work is required to address these issues and fill the gaps for more efficient, scalable and secure blockchain applications, testing the different blockchain approaches in large scale and real-time environments.

 

[1] S. Nakamoto et al., Bitcoin: A Peer-to-Peer Electronic Cash System. Citeseer, 2008. [Online]. Available: http://bitcoin.org/bitcoin.pdf [2] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, ''Blockchain for AI: Review and open research challenges,'' IEEE Access, vol. 7, pp. 10127-10149, 2019. [3] Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, ''Blockchain challenges and opportunities: A survey,'' Int. J. Web Grid Services, vol. 14, no. 4, pp. 352-375, 2016. [4] S. Bano, M. Al-Bassam, and G. Danezis, ''The road to scalable blockchain designs,'' USENIX, Login, Mag., Dec. 2017, pp. 1-6. [5] A. Gervais, G. O. Karame, and K. Wu?st, V. Glykantzis, H. Ritzdorf, and S. Capkun, ''On the security and performance of proof of work blockchains,'' in Proc. ACM SIGSAC Conf. Comput. Commun. Secure, Oct. 2016, pp. 3-16. [6] A. Gervais, G.O.Karame,V.Capkun, and S.Capkun, ''Isbitcoina decentralized currency?'' IEEE Security Privacy, vol. 12, no. 3, pp. 54-60, May/Jun. 2014. [7] T.Aste,P.Tasca, and T.D.Matteo, ''Blockchain technologies: The foreseeable impact on society and industry,'' Computer, vol. 50, no. 9, pp. 18-28, Jan. 2017. [8] M. Kouhizadeh and J. Sarkis, ''Blockchain practices, potentials, and perspectives in greening supply chains,'' Sustainability, vol. 10, no. 10, p. 3652, Oct. 2018. [9] F. Casino, T. K. Dasaklis, and C. Patsakis, ''A systematic literature review of blockchain-based applications: Current status, classification and open issues,'' Telematics Inform., vol. 36, pp. 55-81, Mar. 2019. [10] M. Alharby and A. van Moorsel, ''Blockchain-based smart contracts: A systematic mapping study,'' 2017, arXiv:1710.06372. [Online]. Avail- able: https://arxiv.org/abs/1710.06372 [11] R.A.Memon,J.P.Li, and J.Ahmed, ''Simulation model for block chain systems using queuing theory,'' Electronics, vol. 8, no. 2, p. 234, Feb. 2019. [12] L. M. Bach, B. Mihaljevic, and M. Zagar, ''Comparative analysis of blockchain consensus algorithms,'' in Proc. 41st Int. Conv. Inf. Commun. Technol., Electron. Microelectron. (MIPRO), May 2018, pp. 1545-1550. [13] W. Li, S. Andreina, J.-M. Bohli, and G. Karame, ''Securing proof-of- stake blockchain protocols,'' in Data Privacy Management, Cryptocurrencies and Blockchain Technology. Cham, Switzerland: Springer, 2017, pp. 297-315. [14] S. Matsumoto, R.M. Reischuk, IKP: turning a PKI around with decentralized automated incentives, in: 2017 IEEE Sym- posium on Security and Privacy, SP, San Jose, CA, 2017, pp. 410-426. [15] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Pa- pamanthou, "Hawk: The block chain model of cryptography and privacy-preserving smart contracts," in 2016 IEEE Symposium on Security and Privacy (SP'16), pp. 839-858, May 2016.