Secured Key Distribution Scheme for Cryptographic Key Management System

被引:3
|
作者
Khaing, Kyawt Kyawt [1 ]
Aung, Khin Mi Mi [1 ]
机构
[1] ASTAR, Network Storage Technol Div, Data Storage Inst, Singapore, Singapore
关键词
Encryption; Key Management System; Key Distribution Scheme; rekeying;
D O I
10.1109/ARES.2010.96
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key distribution is the task of distributing secret keys between transmitter and receiver by providing security properties. Our key distribution scheme is beneficial for key transactions where the data encrypting key is encrypted with an upper-level key encrypting key and transmitted to the receiving side. We assume there is a trusted authority (TA) in the network which choose a secret key for communicating, and transits it to parties that wants to communicate with. There could be two or more parties that establish a secret key. At the end of a key tree two parties share a key K. The value of K is not known to any other party except TA. This scheme limits amount of cipher text available to an attacker and also limit exposure in event of key compromise. While the other schemes focus to reduce computation, or the amount of data the needs to be exchanged, our scheme is cable of Self-Adaptive key establishment for Large-Scale users as well as reduces the computational complexity.
引用
收藏
页码:481 / 486
页数:6
相关论文
共 50 条
  • [1] A secured cryptographic system based on DNA and a hybrid key generation approach
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    Reddy, K. Subba
    [J]. BIOSYSTEMS, 2020, 197
  • [2] Implementation of a quantum cryptographic key distribution system
    Cheung, WN
    Edward, PJ
    Ganeshkumar, G
    Barbopoulos, LO
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B12 - B16
  • [3] CRYPTOGRAPHIC MASTER-KEY-GENERATION SCHEME AND ITS APPLICATION TO PUBLIC KEY DISTRIBUTION
    KIESLER, T
    HARN, L
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (03): : 203 - 206
  • [4] The Novel Cryptographic Key Generation and Distribution Scheme for Smart Grid
    Wang, Zhidong
    Liu, Piao
    Lin, Peixia
    Yang, Zhibin
    Liang, Mei
    Zuo, Hanmu
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 873 - 875
  • [5] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    [J]. IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125
  • [6] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    [J]. CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [7] A New Public Key Cryptographic Scheme
    Yuan, Feng
    Ou, Haiwen
    Xu, Shengwei
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1944 - 1947
  • [8] Comments on a cryptographic key assignment scheme
    Tang, Q
    Mitchell, CJ
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326
  • [9] A Lightweight Cryptographic Scheme with Dynamic Key
    Wu, Yuxin
    Wang, Jing
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 232 - 236
  • [10] Secured Key Management Scheme for Multicast Network Using Graphical Password
    Lavanya, S.
    SaravanaKumar, N. M.
    Vijayakumar, V.
    Thilagam, S.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04): : 1152 - 1159