A Scheme of IBE Key Issuing Protocol Based on Identity-password Pair

Автор: Weimin Shi

Журнал: International Journal of Engineering and Manufacturing(IJEM) @ijem

Статья в выпуске: 4 vol.2, 2012 года.

Бесплатный доступ

To avoid the impersonation attack, an efficient and secure key issuing protocol based on identity-password pair is proposed, in which an additional identity-password pair issued by KGC and KPAs is used to authenticate a user’s identity. In this protocol we use a simple blinding technique to eliminate the of secure channel and multiple authorities approach to avoid the key escrow problem. Our protocol solves the key-escrow problem successfully and saves at least 4n pairing and 2n Hash operations in comparison to Lee B et al’s protocol.

Identity-based cryptograph, key issuing protocol, key-escrow problem

Короткий адрес: https://sciup.org/15014321

IDR: 15014321

Список литературы A Scheme of IBE Key Issuing Protocol Based on Identity-password Pair

  • Jerry Krasner, Using Elliptic Curve Cryptography (ECC) for Enhanced Embedded Security, 2004.
  • Shamir A. Identity-based Cryptosystem and Signature Schemes[A]. Blakley G R, chaum D CRYPTO84[C]. Berlin:Springer-Verlag, 1984, 47-53.
  • Boneh D, Franklin M. Identity based Encryption from Weil Pairing [A] Kilian J CRYPTO 2001[C]. Berlin: Springer-Verlag, 2001, 213-229.
  • Chen L, Harrison, K Smart, N.P & Soldera D. Applications of multiple trust authorities in pairing based cryptosystems, InfraSec 2002, LNCS 2437, Springer-Verlag, pp. 260-275.
  • Al-Riyami S, Paterson K. Certificateless public key cryptography. Advances in Cryptology-Asiacrypt’2003, Springer-Verlag, pp.452-472.
  • Gentry C., Certificate-based encryption and the certificate revocation problem, Advances in Cryptology-EUROCRYPT 2003, Springer-Verlag, pp.272-293.
  • Lee B., Boyd E., Daeson E., Kim K. Yang J. and Yoo S., Secure key issuing in ID-based cryptography. In proceedings of the Second Australian Information Security Workshop-AISW 2004, pp.69-74.
  • A. Sui, S. S. M. Chow, L.C.K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun and H. W. Chan, Seperable and Anonymous Identity-Based Key Issuing without Secure Channel, in proc. Of the 11th international Comference on Parallel and Distributed Systems (ICPADS 2005),Vol. 2, pp.275-279, 2005.
  • D.Boneh, H.Shacham, and B.Lynn, Short signatures from the Weil pairing, Advance in Cryptology – ASIACRYPT 2001, LNCS 2248, 514-532(2001).
  • P.S.L.M. Barreto et al. Efficient algorithms for pairing-based cryptosystems. In Proc. CRYPTO 2002, LNCS vol. 2442, pp. 354-368. Springer, 2002.
  • S.D. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. In Algorithmic Number Theory 5th International Symposium, ANTS-V, LNCS vol. 2369, pp. 324-337. Springer, 2002.
Еще
Статья научная