Efficient and dynamic key management for multiple identities in identity-based systems

被引:3
|
作者
Guo, Hua [1 ]
Xu, Chang [1 ]
Li, Zhoujun [1 ,2 ]
Yao, Yanqing [1 ]
Mu, Yi [3 ,4 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[2] Beihang Univ, Beijing Key Lab Network Technol, Beijing, Peoples R China
[3] Fujian Normal Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[4] Univ Wollongong, Sch Comp Sci Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Identity-based key management; Provable security; Information security; AGREEMENT PROTOCOLS; ENCRYPTION;
D O I
10.1016/j.ins.2012.08.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional identity-based cryptography requires a user, who holds multiple identities, to hold multiple private keys, where each private key is associated with an identity. Managing multiple private/public keys is a heavy burden to a user due to key management and storage. The recent advancement of identity-based cryptography allow a single private key to map multiple public keys (identities); therefore the private key management is simplified. Unfortunately, the existing schemes capturing this feature do not allow dynamic changes of identities and have a large data size proportional to the number of the associated identities. To overcome these problems, in this paper, we present an efficient and dynamic identity-based key exchange protocol and prove its security under the Bilinear Diffie-Hellman assumption in the random oracle model. Our protocol requires a relatively small bandwidth for a key agreement communication, in comparison with other existing schemes. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:579 / 590
页数:12
相关论文
共 50 条
  • [1] Efficient identity-based key encapsulation to multiple parties
    Barbosa, M
    Farshim, P
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 428 - 441
  • [2] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    [J]. ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [3] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198
  • [4] An efficient identity-based secret key management scheme for MANETs
    Zhang, Yong
    Qian, Hai-Feng
    [J]. Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
  • [5] An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
    ZHOU Huan
    WANG Xiaofeng
    SU Jinshu
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 455 - 460
  • [6] Efficient identity-based key encapsulation scheme with wildcards for email systems
    Yang, Yang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (01) : 171 - 183
  • [7] Efficient Identity-Based Key Issue With TPM
    Guan, Zhi
    Sun, Huiping
    Chen, Zhong
    Nan, Xianghao
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2354 - 2359
  • [8] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [9] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
  • [10] Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment
    Huang, Jyun-Yao
    Liao, I-En
    Chiang, Chen-Kang
    [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 883 - 887