Key Management Scheme Based on (t, n) Threshold Cryptosystem

被引:0
|
作者
Zhou, Xuanwu [1 ]
Wei, Ping [1 ]
机构
[1] Engn Coll APF, Key Lab Network & Informat Secur APF, Xian 710086, Peoples R China
关键词
D O I
10.1109/ISKE.2008.4731129
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper analyzed the security threats and system flaws of present key management schemes. Combining (t,n) threshold cryptography and key management, we present a threshold key management scheme based on ECC (Elliptic Curve Cryptosystem). By utilizing secret key sharing and probabilistic encryption algorithm key management, the scheme achieves threshold management of symmetric key and public key certificate, avoids the relevance between different certificates generated by the same CA (Certificate Agency) or KDC (Key Distribution Center). The scheme avoids the misuse of certificate generation and anonymity of CA/ KDC members, effectively prevents coalition attack, intruder-in-middle attack and generalized certificate forgery. Further analyses and comparison with other key management schemes also justify the scheme's brevity, security, high efficiency, and thus considerable improvement on system efficiency regarding software and hardware application. Therefore, the scheme is most applicable to such circumstances as with restricted computation ability, integrated space and limited bandwidth yet requiring for high-speed operation.
引用
收藏
页码:1288 / 1293
页数:6
相关论文
共 50 条
  • [1] Threshold Cryptosystem and Its Application in Key Management Scheme
    Zhou, Xuanwu
    Yang, Xiaoyuan
    [J]. KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 293 - 297
  • [2] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    [J]. Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [3] A threshold key escrow scheme based on public key cryptosystem
    曹珍富
    [J]. Science China Technological Sciences, 2001, (04) : 441 - 448
  • [4] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [5] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [6] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [7] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [8] Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1309 - 1311
  • [9] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [10] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532