题名

Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes

DOI

10.6702/ijbi.2010.5.1.3

作者

Chien-Lung Hsu;Tzong-Chen Wu;Kuo-Yu Tsai

关键词

Certificateless ; key distribution ; conference key distribution

期刊名称

International Journal of Business and Information

卷期/出版年月

5卷1期(2010 / 06 / 01)

页次

46 - 62

内容语文

英文

英文摘要

In this paper, we propose two authenticated key distribution protocols and one conference key protocol using identity-based, self-certified public keys. These proposed protocols have the following properties:(i) No extra public key certificates and computational efforts are required for verification of authenticity for public keys.(ii) Key establishment and validation of the desired public keys are integrated in a logically single step.(iii) Each registering user can use his derived private key to check the validity of his public key issued by the system authority.(iv) The system authority cannot access to users' private keys. Hence, all private keys cannot be compromised in case of disruption or corruption of the system authority.(v) The proposed protocols provide the security property of key authentication whereby one user is assured that no other user aside from specifically identified user (s) may gain access to the derived shared key/conference key.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 管理學
参考文献
  1. Al-Riyami, S.S., and K. Paterson. 2003. Certificateless public key cryptography, Cryptology ePrint Archive, Report 2003/126, downloadable from Web site http://eprint.iacr.org/2003/126/.
  2. International Organization for Standardization. 1995. Information technology --Open Systems Interconnection -- The Directory: Models, ISO/IEC 9594-2:2008..
  3. International Organization for Standardization. 1994. Information technology --Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC 9798-2: 2008..
  4. International Organization for Standardization. 1993. Information technology --Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques, ISO/IEC 9798-3: 1998..
  5. Boneh, D.,Franklin, M.(2001).Identity-based encryption from the Weil pairing.Advances in Cryptology - CRYPTO 2001
  6. Diffie, W.,Hellman, M.(1976).New directions in cryptography.IEEE Transactions on Information Theory,IT-22(6),644-654.
  7. ElGamal, T.(1985).A public-key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory,IT-31(4),469-472.
  8. Girault, M.(1991).Self-certified public keys.Advances in Cryptology - EUROCRYPT 1991
  9. Kohnfelder, L.M.(1978).Department of Electrical Engineering, MIT.
  10. Liu, J.K.,Au, M.H.,Susilo, W.(2007).Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model.Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security
  11. Menezes, A.,Oorschot, P.,Vanstone, S.(1997).Handbook of Applied Cryptography.CRC Press, Inc..
  12. Saeednia, S.(1997).Identity-based and self-certified key exchange protocols.Proceedings Information Security and Privacy - Second Australasian Conference(ACISP'97)
  13. Saeednia, S.(2003).A note on Girault's self-certified model.Information Processing Letter,86(6),323-327.
  14. Schneier, B.(1996).Applied Cryptography.John Wiley & Sons, Inc..
  15. Shamir, A.(1984).Identity-based cryptosystems and signature schemes.Advances in Cryptology-CRYPTO 1984
  16. Smart, N.(2002).Identity-based authenticated key agreement protocol based on Weil pairing.Electronics Letters,38(13),630-632.
  17. Wu, T.C.(2001).Digital signature/multi-signature schemes giving public key verification and message recovery simultaneously.International Journal of Computer Systems Science and Engineering,16(6),329-337.
  18. Wu, T.C.,Chang, Y.S.,Lin, T.Y.(1998).Improvement of Saeednia's self-certified key exchange protocols.Electronics Letters,34(11),1094-1095.
  19. Yi, X.(2003).Efficient ID-based key agreement from Weil pairing.Electronics Letters,39(2),206-208.
  20. Zhu, R.W.,Yang, G.,Wong, D.S.(2007).An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices.Theoretical Computer Science,378(2),198-207.