Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes
International Journal of Business and Information
View Archive InfoField | Value | |
Title |
Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes
|
|
Creator |
Hsu, Chien-Lung
Wu, Tzong-Chen Tsai, Kuo-Yu |
|
Description |
In this paper, we propose two authenticated key distribution protocols and one conference key protocol using identity-based, self-certified public keys. These proposed protocols have the following properties:(i) No extra public key certificates and computational efforts are required for verification of authenticity for public keys.(ii) Key establishment and validation of the desired public keys are integrated in a logically single step.(iii) Each registering user can use his derived private key to check the validity of his public key issued by the system authority.(iv) The system authority cannot access to users’ private keys. Hence, all private keys cannot be compromised in case of disruption or corruption of the system authority.(v) The proposed protocols provide the security property of key authentication whereby one user is assured that no other user aside from specifically identified user(s) may gain access to the derived shared key/conference key.
|
|
Publisher |
International Business Academics Consortium
|
|
Date |
2015-11-13
|
|
Type |
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion Peer-reviewed Article |
|
Format |
application/pdf
|
|
Identifier |
https://ijbi.org/ijbi/article/view/48
|
|
Source |
International Journal of Business and Information; Vol 5 No 1 (2010)
2520-0151 1728-8673 |
|
Language |
eng
|
|
Relation |
https://ijbi.org/ijbi/article/view/48/52
|
|
Rights |
Copyright (c) 2015 International Journal of Business and Information
|
|