DocumentCode :
2086626
Title :
Key management scheme based on (t, n) threshold cryptosystem
Author :
Zhou, Xuanwu ; Wei, Ping
Author_Institution :
Key Lab. of Network & Inf. Security of the APF, Eng. Coll. of the APF, Xi´´an, China
Volume :
1
fYear :
2008
fDate :
17-19 Nov. 2008
Firstpage :
1288
Lastpage :
1293
Abstract :
This paper analyzed the security threats and system flaws of present key management schemes. Combining (t,n) threshold cryptography and key management, we present a threshold key management scheme based on ECC ( Elliptic Curve Cryptosystem ). By utilizing secret key sharing and probabilistic encryption algorithm in key management, the scheme achieves threshold management of symmetric key and public key certificate, avoids the relevance between different certificates generated by the same CA (Certificate Agency) or KDC (Key Distribution Center). The scheme avoids the misuse of certificate generation and anonymity of CA/ KDC members, effectively prevents coalition attack, intruder-in-middle attack and generalized certificate forgery. Further analyses and comparison with other key management schemes also justify the scheme¿s brevity, security, high efficiency, and thus considerable improvement on system efficiency regarding software and hardware application. Therefore, the scheme is most applicable to such circumstances as with restricted computation ability, integrated space and limited bandwidth yet requiring for high-speed operation.
Keywords :
probability; public key cryptography; certificate agency; certificate generation; coalition attack; elliptic curve dryptosystem; generalized certificate forgery; intruder-in-middle attack; key distribution center; probabilistic encryption algorithm; public key certificate; secret key sharing; security threats; system flaws; threshold cryptosystem; threshold key management scheme; Conference management; Elliptic curve cryptography; Engineering management; Forgery; Information security; Intelligent systems; Knowledge engineering; Knowledge management; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-1-4244-2196-1
Electronic_ISBN :
978-1-4244-2197-8
Type :
conf
DOI :
10.1109/ISKE.2008.4731129
Filename :
4731129
Link To Document :
بازگشت