Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy

被引:11
作者
Chen, Hsing-Chung [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
cryptography; electronic mail; data security; key agreement; group key; group communication; Chinese Remainder Theorem;
D O I
10.1002/sec.536
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic mail (e-mail) systems are widely used in the Internet. A user usually needs to send an e-mail to a group of users. In this paper, a secure multicast key protocol for e-mail systems with providing perfect forward secrecy is proposed to ensure confidentiality and authentication of this kind of e-mail system. The protocol employs the Chinese Remainder Theorem, RSA public key cryptosystems, and one-way hash functions. The protocol can save redundant key materials used for the e-mails. Via the security analysis, the protocol can satisfy the security requirements. In addition, we analyze the computation complexity of the protocol. The result showed that the protocol can save the computation cost for each e-mail sender. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:100 / 107
页数:8
相关论文
共 22 条
[1]  
Abadi M., 2002, P 11 INT C WORLD WID, P387, DOI DOI 10.1145/511446.511497
[2]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_34
[4]  
Atkins D., 1995, PGP MESSAGE IN PRESS
[5]  
BALENSON D, 1993, 1423 RFC
[6]   Efficient and practical fair exchange protocols with off-line TTP [J].
Bao, F ;
Deng, RH ;
Mao, WB .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :77-85
[7]   Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach [J].
Basagiannis, S. ;
Petridou, S. ;
Alexiou, N. ;
Papadimitriou, G. ;
Katsaros, P. .
COMPUTERS & SECURITY, 2011, 30 (04) :257-272
[8]   A novel e-mail protocol using three-party password-authenticated key exchange [J].
Chang, Chin-Chen ;
Wu, Yu-Ching ;
Chang, Shih-Chang .
SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, :150-154
[9]   Flaws in an e-mail protocol of Sun, Hsieh, and Hwang [J].
Dent, AW .
IEEE COMMUNICATIONS LETTERS, 2005, 9 (08) :718-719
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654