Record Details

Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes

International Journal of Business and Information

View Archive Info
 
 
Field Value
 
Title Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes
 
Creator Hsu, Chien-Lung
Wu, Tzong-Chen
Tsai, Kuo-Yu
 
Description In this paper, we propose two authenticated key distribution protocols and one conference key protocol using identity-based, self-certified public keys. These proposed protocols have the following properties:(i) No extra public key certificates and computational efforts are required for verification of authenticity for public keys.(ii) Key establishment and validation of the desired public keys are integrated in a logically single step.(iii) Each registering user can use his derived private key to check the validity of his public key issued by the system authority.(iv) The system authority cannot access to users’ private keys. Hence, all private keys cannot be compromised in case of disruption or corruption of the system authority.(v) The proposed protocols provide the security property of key authentication whereby one user is assured that no other user aside from specifically identified user(s) may gain access to the derived shared key/conference key.
 
Publisher International Business Academics Consortium
 
Date 2015-11-13
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
 
Format application/pdf
 
Identifier https://ijbi.org/ijbi/article/view/48
 
Source International Journal of Business and Information; Vol 5 No 1 (2010)
2520-0151
1728-8673
 
Language eng
 
Relation https://ijbi.org/ijbi/article/view/48/52
 
Rights Copyright (c) 2015 International Journal of Business and Information