Key Management Scheme Based on (t, n) Threshold Cryptosystem

被引:0
|
作者
Zhou, Xuanwu [1 ]
Wei, Ping [1 ]
机构
[1] Engn Coll APF, Key Lab Network & Informat Secur APF, Xian 710086, Peoples R China
关键词
D O I
10.1109/ISKE.2008.4731129
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper analyzed the security threats and system flaws of present key management schemes. Combining (t,n) threshold cryptography and key management, we present a threshold key management scheme based on ECC (Elliptic Curve Cryptosystem). By utilizing secret key sharing and probabilistic encryption algorithm key management, the scheme achieves threshold management of symmetric key and public key certificate, avoids the relevance between different certificates generated by the same CA (Certificate Agency) or KDC (Key Distribution Center). The scheme avoids the misuse of certificate generation and anonymity of CA/ KDC members, effectively prevents coalition attack, intruder-in-middle attack and generalized certificate forgery. Further analyses and comparison with other key management schemes also justify the scheme's brevity, security, high efficiency, and thus considerable improvement on system efficiency regarding software and hardware application. Therefore, the scheme is most applicable to such circumstances as with restricted computation ability, integrated space and limited bandwidth yet requiring for high-speed operation.
引用
收藏
页码:1288 / 1293
页数:6
相关论文
共 50 条
  • [41] Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve
    WANG Hua-qun1
    2.Applied Mathematics and Physics Department
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 165 - 168
  • [42] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    [J]. ELECTRONICS, 2023, 12 (18)
  • [43] A secret sharing scheme based on (t, n) threshold and adversary structure
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (05) : 379 - 385
  • [44] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    [J]. International Journal of Information Security, 2009, 8
  • [45] New Signcryption Scheme based on Multivariate Public-key Cryptosystem
    Han Yiliang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 227 - 230
  • [46] Secure (T,N) threshold signature scheme
    Wang, Bin
    Pan, Hao-Dong
    Li, Jian-Hua
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (09): : 1333 - 1336
  • [47] Cheater identification in (t,n) threshold scheme
    Tan, KJ
    Zhu, HW
    Gu, SJ
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 762 - 765
  • [48] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
    Peng, CG
    Li, X
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
  • [49] Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem
    夏祥胜
    洪帆
    耿永军
    崔国华
    [J]. Railway Engineering Science, 2008, (01) : 18 - 23
  • [50] A new forward-secure threshold signature scheme based on Schnorr cryptosystem
    Cheng, Guosheng
    Yun, Cuilan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 599 - +