Key Management Scheme Based on (t, n) Threshold Cryptosystem

被引:0
|
作者
Zhou, Xuanwu [1 ]
Wei, Ping [1 ]
机构
[1] Engn Coll APF, Key Lab Network & Informat Secur APF, Xian 710086, Peoples R China
关键词
D O I
10.1109/ISKE.2008.4731129
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper analyzed the security threats and system flaws of present key management schemes. Combining (t,n) threshold cryptography and key management, we present a threshold key management scheme based on ECC (Elliptic Curve Cryptosystem). By utilizing secret key sharing and probabilistic encryption algorithm key management, the scheme achieves threshold management of symmetric key and public key certificate, avoids the relevance between different certificates generated by the same CA (Certificate Agency) or KDC (Key Distribution Center). The scheme avoids the misuse of certificate generation and anonymity of CA/ KDC members, effectively prevents coalition attack, intruder-in-middle attack and generalized certificate forgery. Further analyses and comparison with other key management schemes also justify the scheme's brevity, security, high efficiency, and thus considerable improvement on system efficiency regarding software and hardware application. Therefore, the scheme is most applicable to such circumstances as with restricted computation ability, integrated space and limited bandwidth yet requiring for high-speed operation.
引用
收藏
页码:1288 / 1293
页数:6
相关论文
共 50 条
  • [21] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [22] An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    Jeng, Fuh-Gwo
    Wang, Chung-Ming
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1161 - 1167
  • [23] A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 106 - 112
  • [24] A public key cryptosystem and signature scheme based on numerical series
    Khaled A. Nagaty
    [J]. SN Applied Sciences, 2020, 2
  • [25] Fast Public key Cryptosystem Based Blind Signature Scheme
    Zhou, Xuanwu
    [J]. INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 505 - 511
  • [26] A new (t, n)-threshold scheme based on difference equations
    Chan, Chao-Wen
    Chang, Chin-Chen
    [J]. COMBINATORICS, ALGORITHMS, PROBABILISTIC AND EXPERIMENTAL METHODOLOGIES, 2007, 4614 : 94 - +
  • [27] A public key cryptosystem and signature scheme based on numerical series
    Nagaty, Khaled A.
    [J]. SN APPLIED SCIENCES, 2020, 2 (02):
  • [28] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [29] Software Watermarking Scheme Based on Multivariate Public Key Cryptosystem
    SUN Xiaoyan
    ZHANG Maosheng
    MAO Shaowu
    REN Zhengwei
    ZHANG Huanguo
    [J]. Wuhan University Journal of Natural Sciences, 2016, 21 (03) : 257 - 261
  • [30] A Practical Key Issuing Scheme in Identity-based Cryptosystem
    Wang, Changji
    Liu, Jing
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 454 - 457