Key Generation Protocol in IBC
نویسندگان
چکیده
Identity Based Cryptography (IBC) is well known method in the field of security, however it has an inherent drawback of Key Escrow under which central key generation center is a sole issuing authority of private key and thus could misuse it. Our survey finds numerous solutions of key escrow; out of them secure key issuing protocol (SKIP) is most prominent. However, there are scopes for improving communication efficiency of this protocol. Thus, we propose an improved version of this protocol by employing clustering approach. With theoretical and empirical analysis, we demonstrate that the proposed approach indeed effectively reduces the communication overheads and improves efficiency of the original secure key issuing protocol.
منابع مشابه
Uropathogenic Escherichia coli flagella aid in efficient urinary tract colonization.
In the murine model of urinary tract infections (UTI), cystitis by uropathogenic Escherichia coli (UPEC) occurs through an intimate relationship with the bladder superficial umbrella cell entailing cycles of adherence, invasion, intracellular bacterial community (IBC) formation, and dispersal (fluxing) from the intracellular environment. IBC dispersal is a key step that results in the spread of...
متن کاملAuthentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication methods based on biometric parameters are gaining importance over the years. But they require the storage and transmission security of fingerprint templates to perform this task. In this work an efficient method based on digital fingerprint random encryption IBC is introduced. The process works by user’s fingerprint feature and asymmetric authentication technology to security imp...
متن کاملBootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of ...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملSelf-Generated-Certificate Based Cryptographic Protocol with Lite Certificate Management
In spite of the vital role played by Digital Certificates in Public Key Cryptographic systems, the overhead involved in maintaining those made them prohibitory. Certificateless Public Key Cryptography [1] was proposed as an alternative. It was based on based on the concept of implicit certification. Even though Certificateless Public Key Cryptography (CLPKC) combines the appealing features of P...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2013