Secure Peer-to-Peer Communication Based on Blockchain

  • Kahina KhacefEmail author
  • Guy PujolleEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)


Nowadays, electronic messaging is the most used network application, and the authentication between users is a vital property. The most commonly employed approaches to ensure this property are PKI and S/MIME email encryption protocols, but indeed they are facing multiples security threats, such as the MITM attack and EFAIL attack. The blockchain is an innovative technology that overcomes these threats and allows to decentralize sensitive operations while preserving a high level of security. It eliminates the need for trusted intermediaries. The blockchain is accessible to all network nodes and keeps track of all transactions already made. The goal of our work is to propose a secure messaging solution based on the blockchain technology. In this paper, we explain why blockchain would make communications more secure, and we propose a model design for blockchain-based messaging maintaining the performance and security of data recorded on the blockchain, using a smart contract to verify the identities and their associated public keys, and validate the user’s certificate. The system is entirely decentralized and allows users to exchange messages securely.


  1. 1.
    Schuermann, F.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 2084–2092 (2016)CrossRefGoogle Scholar
  2. 2.
    Bano, S., Sonnino, A., Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: SoK: consensus in the age of blockchains, arxiv (2016)Google Scholar
  3. 3.
    Cachin, C., Vukoli, M.: Blockchain Consensus Protocols in the Wild (2016)Google Scholar
  4. 4.
    Loibi, A.: Namecoin, Seminar innovative Internettechnologien und mobilkommunikation SS2014. IEEE (2014)Google Scholar
  5. 5.
    Hung, T., Svetinovic, D.: Data analysis of digital currency network: namecoin case study. In: International Conference on Engineering of Complex Computer Systems (2016)Google Scholar
  6. 6.
    Deepak, K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities. IEEE (2017)Google Scholar
  7. 7.
    Mudliar, K., Parekh, H., Bhavathankar, P.: A comprehensive integration of national identity with blockchain technology. In: 2018 International Conference on Communication, Information and Computing Technology (ICCICT), 2–3 February, Mumbai, India (2018)Google Scholar
  8. 8.
    Aung, Y.N., Tantidham, T.: Review of Ethereum: smart home case study. In: 2017 2nd International Conference on Information Technology (INCIT) (2017)Google Scholar
  9. 9.
    Ward, M.: Untangling Blockchain: A Data Processing View of Blockchain Systems, Elsevier Information Security Technical report, pp. 89–92 (2006)Google Scholar
  10. 10.
    Tewari, H., Nuallain, E.: Netcoin: A Traceable P2P Electronic Cash System. IEEE (2016)Google Scholar
  11. 11.
    Guy, Z., Oz, N., Alex, P.: Decentralized Privacy: Using Blockchain to Protect Personal Data (2018)Google Scholar
  12. 12.
    Conti, M., Kumar, S., Lal, C., Ruj, S.: A Survey on Security and Privacy Issues of Bitcoin. IEEE (2017)Google Scholar
  13. 13.
    Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus Protocols for Blockchain based Data Provenance: Challenges and Opportunities. IEEE (2017)Google Scholar
  14. 14.
    Kalodner, H., Carlsten, M., Ellenbogen, P., Bonneau, J., Narayanan, A.: An empirical study of Namecoin and lessons for decentralized namespace design. Blockchain (2014)Google Scholar
  15. 15.
    Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: International Conference on Advanced Computing and Communication Systems (ICACCS 2017)Google Scholar
  16. 16.
    Mingxia, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., Qijin, C.: A Review on Consensus Algorithm of Blockchain. IEEE (2017)Google Scholar
  17. 17.
    Dai, F., Shi, Y., Meng, N., Wei, L., Ye, Z.: From bitcoin to cybersecurity: a comparative study of blockchain application and security issues/ICSAI, pp. 975–979 (2017)Google Scholar
  18. 18.
    Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchain. In: USENIX Annual Technical Conference (2016)Google Scholar
  19. 19.
    Fronknecht, C., Velicannu, G., Sophia, Y.: CertCoin: A Namecoin Based Decentralized Authentication System (2014)Google Scholar
  20. 20.
    Khovayko, O., Shumilov, E.: EMCSSL Decentralized identity management, passwordless logins, and client SSL certificates using Emercoin NVS (2016).
  21. 21.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Sorbonne UniversityParisFrance

Personalised recommendations