共 31 条
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
被引:7
作者:
Feng, Qi
[1
,2
]
He, Debiao
[1
,2
]
Wang, Huaqun
[3
]
Wang, Ding
[4
]
Huang, Xinyi
[5
]
机构:
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210023, Peoples R China
[4] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[5] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Fujian Prov Key Lab Network Secur & Cryptology, Coll Math & Informat, Fuzhou 350117, Peoples R China
基金:
中国国家自然科学基金;
关键词:
protocols;
cryptographic protocols;
cryptography;
digital signatures;
authorisation;
telecommunication security;
private key cryptography;
public key cryptography;
multiparty key generation protocol;
identity-based signature scheme;
IEEE P1363 standard;
identity-based cryptography;
promising mechanism;
lightweight authentication;
powerful access control;
inherent problems;
key escrow;
secure channel;
effective key issuing protocol;
distributed setting;
weaker assumptions;
trusted party;
key distribution;
ELLIPTIC-CURVES;
ENCRYPTION;
D O I:
10.1049/iet-ifs.2020.0096
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
Identity-based cryptography (IBC) is considered as a promising mechanism in the Internet of Things andad-hocnetworks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. key escrow and the requirement of a secure channel, which are not always good properties in many realistic scenarios. Thus, an efficient key issuing protocol in a distributed setting without the assumption of the secure channel is needed. In this study, the authors give special attention to the IBC standardised inIEEE P1363and design a multi-party setup and key issuing protocol for it. Their protocol is proven to be malicious secure by simulation under weaker assumptions. Contrast to prior works that rely on a trusted party for key distribution or the strong assumption of a secure channel, they provide the first practical solution for the distributed architectures.
引用
收藏
页码:724 / 732
页数:9
相关论文