{"title":"Non-interactive Certificate Update Protocol for Efficient Authentication in IoT","authors":"Li Duan, Yong Li, L. Liao","doi":"10.1145/3365871.3365879","DOIUrl":null,"url":null,"abstract":"A non-interactive certificate update protocol (NICU) allows CA to update the public key of node certificates without interacting with nodes and with the new certificate, a node can update its private signing key accordingly. In this paper, we provide construction of efficient NICU protocols and instantiate them based on pseudo random function, public key encryption and the homomorphic property of the signature key pairs. We thoroughly evaluate the NICU protocols and exhibit their outstanding efficiency in terms of speed of certificate update, and bandwidth consumption. In addition, our formal security analysis of NICU protocols can also be of independent interest.","PeriodicalId":350460,"journal":{"name":"Proceedings of the 9th International Conference on the Internet of Things","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Conference on the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3365871.3365879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
A non-interactive certificate update protocol (NICU) allows CA to update the public key of node certificates without interacting with nodes and with the new certificate, a node can update its private signing key accordingly. In this paper, we provide construction of efficient NICU protocols and instantiate them based on pseudo random function, public key encryption and the homomorphic property of the signature key pairs. We thoroughly evaluate the NICU protocols and exhibit their outstanding efficiency in terms of speed of certificate update, and bandwidth consumption. In addition, our formal security analysis of NICU protocols can also be of independent interest.