3 An Authenticated Key Transport Protocol Using Symmetric Encryption

被引:0
作者
Joshi, Manisha Y. [1 ]
Bichkar, R. S. [2 ]
机构
[1] MGMs Coll Engn, Nanded, India
[2] GH Raisoni Coll Engn & Technol, Pune, Maharashtra, India
来源
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8 | 2010年
关键词
Shamir's no key protocol; key distribution system; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir's No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir's No-key protocol, which provides an authentication as well as key conformation. Proposed protocol can be used to distribute the shares in secrete sharing schemes or to distribute secrete keys to the user.
引用
收藏
页码:348 / 350
页数:3
相关论文
共 7 条
[1]  
[Anonymous], 2510 RFC
[2]   FULLY-FLEDGED 2-WAY PUBLIC-KEY AUTHENTICATION AND KEY AGREEMENT FOR LOW-COST TERMINALS [J].
BELLER, MJ ;
YACOBI, Y .
ELECTRONICS LETTERS, 1993, 29 (11) :999-1001
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]  
Khayat S.H., USING COMMUTATIVE EN
[5]  
Kohl J., 1993, 1510 RFC
[6]  
Menezes P. van Oorschot, HDB APPL CRYPTOGRAPH
[7]  
Needham R., 1978, COMMUNICATIONS ACM, V21