Title :
3An authenticated key transport protocol using symmetric encryption
Author :
Joshi, Manisha Y. ; Bichkar, R.S.
Author_Institution :
M.G.M.´´s Coll. of Eng., Nanded, India
Abstract :
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir´s No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir´s No-key protocol, which provides an authentication as well as key conformation. Proposed protocol can be used to distribute the shares in secrete sharing schemes or to distribute secrete keys to the user.
Keywords :
cryptographic protocols; transport protocols; Shamir´s no-key protocol; authenticated key transport protocol; secret key; session key; symmetric encryption; Cryptography; Shamir´s no key protocol; authentication; key distribution system;
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
DOI :
10.1109/ICCSIT.2010.5564830