A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism

被引:4
作者
Chen, Hsing-Chung [1 ]
Yang, Cheng-Ying [2 ]
Su, Hui-Kai [3 ]
Wei, Ching-Chuan [4 ]
Lee, Chao-Ching [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[2] Univ Taipei, Dept Comp Sci, Taipei 100, Taiwan
[3] Natl Formosa Univ, Dept Elect Engn, Yunlin 632, Taiwan
[4] Chaoyang Univ Technol, Dept Informat & Commun Engn, Taichung 413, Taiwan
关键词
factorial number structure; e-mail; security; cryptography; PROVIDING PERFECT; SYSTEMS; SECRECY;
D O I
10.2298/CSIS130924066C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic mail (e-mail) has been used to transfer various types of electronic data in Internet. Usually, a user has to send an e-mail to a specific group of users with a secure delivery mechanism. In this paper, a novel and feasible e-mail delivery mechanism using the secure multicast protocol with an ID-based factorial number structure (FNS) is proposed in the multicast system. In the proposed e-mail delivery mechanism, the e-mail is required to be encrypted before sending out in order to safeguard the message via a public channel, such as wire public switching communication links and wireless communication systems. Without loss generality, the public-key system is adopted in the proposed secure multicast system for a convenient and easy key management. The proposed scheme outperforms the existing methods for more easily to construct secure e-mail system. Furthermore, the security of the proposed scheme is analyzed, including replay attack, sender impersonation attack, unknown key-share attack, forgery attack and insider attack. Finally, the computation complexities of the proposed mechanism are discussed. The result shows that the proposed scheme outperforms the CRT-based secure e-mail scheme.
引用
收藏
页码:1091 / 1112
页数:22
相关论文
共 25 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_34
[3]  
Atkins D., 1995, PGP MESSAGE IN PRESS
[4]  
BALENSON D, 1993, 1423 RFC
[5]   Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach [J].
Basagiannis, S. ;
Petridou, S. ;
Alexiou, N. ;
Papadimitriou, G. ;
Katsaros, P. .
COMPUTERS & SECURITY, 2011, 30 (04) :257-272
[6]   A novel e-mail protocol using three-party password-authenticated key exchange [J].
Chang, Chin-Chen ;
Wu, Yu-Ching ;
Chang, Shih-Chang .
SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, :150-154
[7]  
Chen H. C, 2013, P 2013 7 INT C INN M, P611
[8]   Packet construction for secure conference call request in ad hoc network systems [J].
Chen, Hsing-Chung ;
Wang, Shiuh-Jeng ;
Wen, Jyh-Horng .
INFORMATION SCIENCES, 2007, 177 (24) :5598-5610
[9]   Cognitive RBAC in Mobile Heterogeneous Networks [J].
Chen, Hsing-Chung ;
Violetta, Marsha Anjanette ;
Weng, Chien-Erh ;
Kung, Tzu-Liang .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) :779-806
[10]   Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy [J].
Chen, Hsing-Chung .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) :100-107